Automating Security Detection Engineering, published by Packt
☆67Oct 12, 2024Updated last year
Alternatives and similar repositories for Automating-Security-Detection-Engineering
Users that are interested in Automating-Security-Detection-Engineering are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Practical Threat Detection Engineering, Published by Packt☆87Mar 2, 2026Updated last month
- A POC to implement Detection-as-Code with Terraform and Sumo Logic.☆31Jul 27, 2023Updated 2 years ago
- Detection rules and threat hunting queries in Defender XDR and Azure Sentinel☆16Mar 13, 2026Updated 3 weeks ago
- A guide to simplify the process of evaluating Datadog's Cloud SIEM security capabilities to detect AWS threats.☆20Jul 24, 2023Updated 2 years ago
- Sightings Ecosystem gives cyber defenders visibility into what adversaries actually do in the wild. With your help, we are tracking MITRE…☆38May 28, 2025Updated 10 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Configure and deploy AWS GuardDuty.☆12Sep 9, 2025Updated 7 months ago
- ☆34Nov 11, 2025Updated 5 months ago
- A repository to store community malware research notes and findings.☆15Feb 13, 2026Updated last month
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆60Mar 12, 2022Updated 4 years ago
- Detection Engineering is a tactical function of a cybersecurity defense program that involves the design, implementation, and operation o…☆1,162Apr 1, 2026Updated last week
- Save toil in security operations with: Detection & Intelligence Analysis for New Alerts (D.I.A.N.A. )☆223Sep 4, 2024Updated last year
- ✨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The …☆291Feb 5, 2024Updated 2 years ago
- ☆14Jan 2, 2025Updated last year
- The Measure, Maximize, and Mature Threat-Informed Defense (M3TID) project defines what Threat-Informed Defense (TID) is and the key activ…☆16Jun 25, 2025Updated 9 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Awesome Splunk SPL hunt queries that can be used to detect the latest vulnerability exploitation attempts & subsequent compromise☆69Apr 29, 2024Updated last year
- ☆12Jan 5, 2021Updated 5 years ago
- ☆19Mar 26, 2026Updated 2 weeks ago
- On-Premises Open Cyber Threat Intelligence Platform☆11Oct 29, 2024Updated last year
- Repository where I hold random detection and threat hunting queries that I come up with based on different sources of information (or eve…☆280Dec 20, 2025Updated 3 months ago
- Defender Resource Hub☆30Mar 20, 2026Updated 3 weeks ago
- This is a gui interface for airmon-ng☆14Mar 23, 2023Updated 3 years ago
- ☆29Dec 26, 2025Updated 3 months ago
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆11Sep 21, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Detection Engineering research, open-source tools, conference presentations, and technical publications shared with the security communit…☆28Dec 17, 2025Updated 3 months ago
- Will Boyd, 1124, Kubernetes and Cloud Native Associate (KCNA)☆21Dec 16, 2022Updated 3 years ago
- Malware detonation platform Polygon integration☆10Aug 1, 2023Updated 2 years ago
- A repository of KQL queries focused on threat hunting and threat detecting for Microsoft Sentinel & Microsoft XDR (Former Microsoft 365 D…☆766Aug 28, 2025Updated 7 months ago
- LittleSnitch Log Statistics Exporter☆35Apr 16, 2023Updated 2 years ago
- KQL Queries. Microsoft Defender, Microsoft Sentinel☆869Updated this week
- https://academy.tcm-sec.com/☆15Aug 19, 2025Updated 7 months ago
- ☆96Jan 7, 2026Updated 3 months ago
- A community-driven repository for threat hunting ideas, methodologies, and research that serves as a central gathering place for hunters …☆304Mar 19, 2026Updated 3 weeks ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- High-level Threat Intelligence playbooks☆20Mar 6, 2021Updated 5 years ago
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆82Apr 20, 2025Updated 11 months ago
- ☆56Mar 6, 2026Updated last month
- my MSTICpy practice and custom tools repository☆11Apr 23, 2025Updated 11 months ago
- pocket guide for core detection engineering concepts☆31May 8, 2023Updated 2 years ago
- Knowledge base for reverse engineering and malware analysis☆15Jan 11, 2026Updated 3 months ago
- External telegram feeder for AIL framework☆18Jan 21, 2026Updated 2 months ago