Открытый репозиторий с правилами на языке eXtraction and Processing (XP)
☆28Sep 30, 2025Updated 5 months ago
Alternatives and similar repositories for open-xp-rules
Users that are interested in open-xp-rules are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Extension for eXtraction and Processing (XP) language in Visual Studio Code☆48Oct 20, 2025Updated 5 months ago
- Enterprise Response Model & Common Knowledge☆38Jul 3, 2025Updated 8 months ago
- Chrome extension for SOC automations☆38Sep 30, 2025Updated 5 months ago
- MP SIEM SDK☆30Dec 15, 2025Updated 3 months ago
- About PIVOting☆13Dec 19, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Program for fuzzing parameters web application☆15Apr 14, 2025Updated 11 months ago
- This project aims to fine-tune a pre-trained LLM using CTI-specific data and evaluate its performance with CTIBench, a benchmark designed…☆17Sep 5, 2024Updated last year
- Code and Website For PatchThis.app☆32Mar 19, 2026Updated last week
- Примеры с моего YouTube/Rutube канала☆42Jan 29, 2026Updated last month
- A memory scanner made in python for linux☆22Jun 6, 2021Updated 4 years ago
- ☆19Mar 26, 2017Updated 8 years ago
- Helps defenders find their WSUS configurations in the wake of CVE-2025-59287☆46Oct 28, 2025Updated 4 months ago
- Script for automating Linux memory capture and analysis☆13May 6, 2020Updated 5 years ago
- ⚠️ ARCHIVED**: This repository is no longer actively maintained. All Sigma rules are now managed and available in SIEM Rules☆12Mar 19, 2026Updated last week
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- 1C Exploit Kit☆79Dec 8, 2021Updated 4 years ago
- ☆75Nov 28, 2025Updated 3 months ago
- ESP32 based Wi-Fi Intrusion Detection System☆29May 11, 2025Updated 10 months ago
- SIEGMA - Transform Sigma rules into SIEM consumables☆159Mar 10, 2025Updated last year
- A collection of phishing techniques used to evade detection. #nolockdown☆23Aug 28, 2025Updated 6 months ago
- An introduction to detection engineering☆14Jan 3, 2025Updated last year
- Portable utility to execute in memory a sequence of opcodes☆18Aug 28, 2016Updated 9 years ago
- A free data collection and YARA scanning tool for cybersecurity incident investigation, compromise assessment and threat hunting☆21Nov 12, 2024Updated last year
- Baseline a Windows System against LOLBAS☆73Feb 2, 2026Updated last month
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Внедрение и эксплуатация PT Application Inspector. Подробнее: https://habr.com/ru/company/pt/blog/557142/☆38Aug 20, 2022Updated 3 years ago
- Malicious shortcut file builder for spear-phishing and red-team engagement.☆17Sep 11, 2023Updated 2 years ago
- Setting up a Windows Event Collector☆13Aug 7, 2023Updated 2 years ago
- Hobby simple kernel (x86-64) and bootloader (UEFI) written in C++.☆20Sep 23, 2024Updated last year
- Wi-Fi MFP Deauthentication: proof-of-concepts, security patches, and more.☆33Apr 15, 2023Updated 2 years ago
- a keylogger for Windows. This is not meant for spying.☆18Jul 25, 2014Updated 11 years ago
- Security Orchestration, Automation and Response for Security Analysts, published by Packt☆23Jan 24, 2025Updated last year
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆51Apr 25, 2024Updated last year
- BasicLDR: A Reflective DLL Loader☆14Jun 11, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A Windows 10 login phishing page for your red team exercises☆15Apr 25, 2021Updated 4 years ago
- Script that checks for available updates for the most commonly used Digital Forensics tools☆61Dec 10, 2020Updated 5 years ago
- A C# stager for SILENTTRINITY (https://github.com/byt3bl33d3r/SILENTTRINITY)☆68Mar 6, 2020Updated 6 years ago
- Multi-quarantine extractor☆52Mar 3, 2026Updated 3 weeks ago
- A Python port of the JJDecoder function written by Syed Zainudeen☆19Jan 28, 2014Updated 12 years ago
- Offline AI Security Assistant for Air-Gapped Pentesting☆73Feb 22, 2026Updated last month
- Bitrix vulnerability scanner☆23Mar 28, 2023Updated 2 years ago