PatrOwl - Open Source, Free and Scalable Security Operations Orchestration Platform
☆150Apr 12, 2022Updated 3 years ago
Alternatives and similar repositories for PatrowlDocs
Users that are interested in PatrowlDocs are comparing it to the libraries listed below
Sorting:
- PatrOwl - Open Source, Free and Scalable Security Operations Orchestration Platform☆245Feb 11, 2026Updated 2 weeks ago
- PatrOwl - Open Source, Smart and Scalable Security Operations Orchestration Platform☆633Feb 10, 2026Updated 3 weeks ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆36Jan 20, 2022Updated 4 years ago
- Searching .evtx logs for remote connections☆24Jul 6, 2023Updated 2 years ago
- This tool is useful to find a particular string in a list of URLs using tesseract's OCR (Optical Character Recognition) capabilities☆31Jan 17, 2022Updated 4 years ago
- Tools to rapidly deploy a threat hunting capability on Azure Sentinel that leverages Sysmon and MITRE ATT&CK☆1,078Nov 28, 2024Updated last year
- ☆16Jul 5, 2017Updated 8 years ago
- Repo for Automations and other solutions for Elastic SIEM/Security.☆18Jun 15, 2021Updated 4 years ago
- A Splunk app mapped to MITRE ATT&CK to guide your threat hunts☆1,173Jul 26, 2023Updated 2 years ago
- Actionable analytics designed to combat threats☆1,005May 25, 2022Updated 3 years ago
- Vulnerability Assessment and Penetration Testing Toolkit☆19Jan 5, 2022Updated 4 years ago
- PatrowlHears - Vulnerability Intelligence Center / Exploits☆166Feb 16, 2026Updated 2 weeks ago
- Cloudformation Template to Launch the SOC from Kali Purple☆54Dec 8, 2023Updated 2 years ago
- Watcher - Open Source AI-powered Cyber Threat Intelligence & Hunting Platform. Developed with Django & React JS.☆1,243Feb 18, 2026Updated last week
- Repository of resources for configuring a Red Team SIEM using Elastic☆101Jul 10, 2018Updated 7 years ago
- Material for the "Hands-On BloodHound" Workshop☆110May 4, 2021Updated 4 years ago
- Pure Honeypots with an automated bash script☆21Sep 9, 2021Updated 4 years ago
- RustHunter is a modular incident response framework based on Rust and Ansible to build and compare environmental baselines.☆18Nov 12, 2025Updated 3 months ago
- Extract credentials from lsass remotely☆16Jan 3, 2020Updated 6 years ago
- Ransomware base in Java for all operating systems☆19Jun 13, 2017Updated 8 years ago
- Pin designs for security related items☆37Feb 16, 2026Updated 2 weeks ago
- Scripts for OSCE☆18Dec 28, 2018Updated 7 years ago
- Threat Intelligence with Elastic - Minemeld integration with Elasticsearch☆19May 11, 2021Updated 4 years ago
- Detect Tactics, Techniques & Combat Threats☆2,264Jan 21, 2026Updated last month
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆36Feb 11, 2020Updated 6 years ago
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,486Jan 12, 2026Updated last month
- Easy automated vulnerability scanning, reporting and analysis☆709Jan 10, 2020Updated 6 years ago
- The SOC Analysts all-in-one CLI tool to automate and speed up workflow.☆1,459Sep 25, 2024Updated last year
- Cortex: a Powerful Observable Analysis and Active Response Engine☆1,552Nov 26, 2025Updated 3 months ago
- TheHive is a Collaborative Case Management Platform, now distributed as a commercial version☆3,890Jul 25, 2025Updated 7 months ago
- VECTR is a tool that facilitates tracking of your red and blue team testing activities to measure detection and prevention capabilities a…☆1,549Feb 10, 2026Updated 3 weeks ago
- Audit Windows Security with best Practice☆192Sep 25, 2024Updated last year
- DejaVU - Open Source Deception Framework☆426Aug 2, 2025Updated 7 months ago
- Shuffle: A general purpose security automation platform. Our focus is on collaboration and resource sharing.☆2,208Updated this week
- A mirror of several precompiled standalone red-teaming tools.☆19Feb 2, 2023Updated 3 years ago
- ELKFH - Elastic, Logstash, Kibana, Filebeat and Honeypot (HTTP, HTTPS, SSH, RDP, VNC, Redis, MySQL, MONGO, SMB, LDAP)☆47Apr 26, 2021Updated 4 years ago
- Automated network asset, email, and social media profile discovery and cataloguing.☆656Jan 6, 2022Updated 4 years ago
- Convert your masscan/subdomain-scan results (80,443,8080) into screenshots for better analysis☆36Jul 10, 2018Updated 7 years ago
- A curated Cyber "Security Orchestration, Automation and Response (SOAR)" awesome list.☆974Aug 26, 2024Updated last year