Automating Security Detection Engineering, published by Packt
☆68Oct 12, 2024Updated last year
Alternatives and similar repositories for Automating-Security-Detection-Engineering
Users that are interested in Automating-Security-Detection-Engineering are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Practical Threat Detection Engineering, Published by Packt☆88Apr 22, 2026Updated last week
- Detection rules and threat hunting queries in Defender XDR and Azure Sentinel☆17Mar 13, 2026Updated last month
- A guide to simplify the process of evaluating Datadog's Cloud SIEM security capabilities to detect AWS threats.☆20Jul 24, 2023Updated 2 years ago
- Sightings Ecosystem gives cyber defenders visibility into what adversaries actually do in the wild. With your help, we are tracking MITRE…☆38May 28, 2025Updated 11 months ago
- Configure and deploy AWS GuardDuty.☆12Sep 9, 2025Updated 7 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆34Apr 8, 2026Updated 3 weeks ago
- A repository to store community malware research notes and findings.☆15Feb 13, 2026Updated 2 months ago
- Doorkeeper is an OAuth 2 provider for Rails.☆13Jan 7, 2015Updated 11 years ago
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆61Mar 12, 2022Updated 4 years ago
- Detection Engineering is a tactical function of a cybersecurity defense program that involves the design, implementation, and operation o…☆1,175Apr 1, 2026Updated last month
- Save toil in security operations with: Detection & Intelligence Analysis for New Alerts (D.I.A.N.A. )☆223Sep 4, 2024Updated last year
- ✨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The …☆291Feb 5, 2024Updated 2 years ago
- ☆14Jan 2, 2025Updated last year
- The Measure, Maximize, and Mature Threat-Informed Defense (M3TID) project defines what Threat-Informed Defense (TID) is and the key activ…☆17Jun 25, 2025Updated 10 months ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- ☆12Jan 5, 2021Updated 5 years ago
- Awesome Splunk SPL hunt queries that can be used to detect the latest vulnerability exploitation attempts & subsequent compromise☆69Apr 29, 2024Updated 2 years ago
- ☆19Mar 26, 2026Updated last month
- On-Premises Open Cyber Threat Intelligence Platform☆11Oct 29, 2024Updated last year
- Repository where I hold random detection and threat hunting queries that I come up with based on different sources of information (or eve…☆281Dec 20, 2025Updated 4 months ago
- Defender Resource Hub☆31Apr 11, 2026Updated 2 weeks ago
- This is a gui interface for airmon-ng☆14Mar 23, 2023Updated 3 years ago
- Anvilogic Forge☆118Mar 31, 2026Updated last month
- ☆29Dec 26, 2025Updated 4 months ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆11Sep 21, 2022Updated 3 years ago
- Detection Engineering research, open-source tools, conference presentations, and technical publications shared with the security communit…☆28Dec 17, 2025Updated 4 months ago
- Will Boyd, 1124, Kubernetes and Cloud Native Associate (KCNA)☆21Dec 16, 2022Updated 3 years ago
- A repository of KQL queries focused on threat hunting and threat detecting for Microsoft Sentinel & Microsoft XDR (Former Microsoft 365 D…☆768Aug 28, 2025Updated 8 months ago
- LittleSnitch Log Statistics Exporter☆35Apr 16, 2023Updated 3 years ago
- KQL Queries. Microsoft Defender, Microsoft Sentinel☆884Updated this week
- https://academy.tcm-sec.com/☆15Aug 19, 2025Updated 8 months ago
- ☆96Jan 7, 2026Updated 3 months ago
- High-level Threat Intelligence playbooks☆21Mar 6, 2021Updated 5 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- A community-driven repository for threat hunting ideas, methodologies, and research that serves as a central gathering place for hunters …☆314Updated this week
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆85Apr 20, 2025Updated last year
- 🚀 IRIS-SOAR: Modular SOAR (Security Orchestration, Automation, and Response) implementation in Python. Designed to complement DFIR-IRIS …☆17Mar 27, 2024Updated 2 years ago
- ☆57Mar 6, 2026Updated last month
- Stupid Simple Detection Testing☆13Mar 7, 2024Updated 2 years ago
- my MSTICpy practice and custom tools repository☆11Apr 23, 2025Updated last year
- Knowledge base for reverse engineering and malware analysis☆15Jan 11, 2026Updated 3 months ago