Open source HIDS tailored for Microsoft Windows and Active Directory
☆29Feb 13, 2026Updated 3 weeks ago
Alternatives and similar repositories for Saeros
Users that are interested in Saeros are comparing it to the libraries listed below
Sorting:
- Cyber threat intelligence tool suite.☆42Apr 3, 2025Updated 11 months ago
- High performance sandbox http framework for performance critical and specialized solutions.☆48Feb 2, 2026Updated last month
- ☆19Oct 23, 2020Updated 5 years ago
- Advanced Threat Hunting: Ransomware Group☆29Jul 9, 2025Updated 7 months ago
- Zeek package to generate a SMB client fingerprint☆27May 5, 2020Updated 5 years ago
- Yet Another Memory Analyzer for malware detection and Guarding Operations with YARA and SIGMA☆81Nov 19, 2025Updated 3 months ago
- Track progress and keep notes while working through likethecoins' CTI Self Study Plan☆29Aug 25, 2022Updated 3 years ago
- Aftermath is a free macOS incident response framework☆34Sep 25, 2025Updated 5 months ago
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Feb 6, 2024Updated 2 years ago
- Research indicators and detection rules☆68Sep 20, 2023Updated 2 years ago
- ☆11Sep 12, 2024Updated last year
- ☆37Dec 17, 2020Updated 5 years ago
- Quick analysis focusing on most important of a Malware or a Threat☆38Sep 4, 2023Updated 2 years ago
- RuleVis is a powerful analysis tool that transforms your Wazuh ruleset into a dynamic, interactive force-directed graph. It helps you vis…☆24Nov 12, 2025Updated 3 months ago
- Engineering Guidance and Standards for the Home Office☆21Feb 27, 2026Updated last week
- Deploy your DNS configuration using GitHub Actions using DNSControl.☆11Feb 19, 2026Updated 2 weeks ago
- This is a gui interface for airmon-ng☆14Mar 23, 2023Updated 2 years ago
- On-Premises Open Cyber Threat Intelligence Platform☆11Oct 29, 2024Updated last year
- KQL queries for Microsoft Defender Advanced Hunting organized around the TTPs of the MITRE ATT&CK framework.☆18Nov 7, 2024Updated last year
- Scripts I have made for blue team☆16Apr 1, 2018Updated 7 years ago
- Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations☆46Nov 1, 2021Updated 4 years ago
- openioc_scan Volatility Framework plugin☆44Feb 25, 2016Updated 10 years ago
- AI-powered security alert management that reduces noise and accelerates response time☆95Updated this week
- Threat intelligence or Cyber Threat Intelligence is the process of identifying and analyzing gathered information about past, current, an…☆13Feb 18, 2024Updated 2 years ago
- ☆13Jan 23, 2026Updated last month
- A Blazor component wrapper for Lottie Web.☆15Aug 2, 2025Updated 7 months ago
- An Ansible playbook that installs Kubernetes☆14Jan 2, 2026Updated 2 months ago
- a github repo that will be used for teaching bash optimizations in a youtube series☆10Jul 6, 2021Updated 4 years ago
- Raspberry Pi night vision goggle code. python code that creates a side by side stero view (steroscopic) from a single camera☆13May 8, 2021Updated 4 years ago
- Content for cyber defense course☆14Oct 15, 2014Updated 11 years ago
- Mindmap/CheatSheet for eLearnSecurity-PTPv5☆10Jun 18, 2020Updated 5 years ago
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Jan 14, 2021Updated 5 years ago
- Indicators of compromise from to analysis and research by Nextron Threat Research team☆12Sep 17, 2025Updated 5 months ago
- Provides a multi-platform Graphical User Interface for hashlookup☆12Jul 12, 2024Updated last year
- Encryption using 2 Factor Authentication through an external drive with Python☆12Jun 7, 2020Updated 5 years ago
- event shipper for Carbon Black Defense notifications☆10Feb 25, 2023Updated 3 years ago
- Android app that turns a MikroTik RouterBoard into a cable testing probe. Run link status, TDR cable tests, speed tests, and generate PDF…☆27Feb 22, 2026Updated last week
- ☆10Dec 24, 2022Updated 3 years ago
- ☆28Updated this week