Открытый репозиторий с правилами на языке eXtraction and Processing (XP)
☆28Sep 30, 2025Updated 5 months ago
Alternatives and similar repositories for open-xp-rules
Users that are interested in open-xp-rules are comparing it to the libraries listed below
Sorting:
- Enterprise Response Model & Common Knowledge☆38Jul 3, 2025Updated 8 months ago
- Chrome extension for SOC automations☆38Sep 30, 2025Updated 5 months ago
- MP SIEM SDK☆31Dec 15, 2025Updated 2 months ago
- Примеры с моего YouTube/Rutube канала☆41Jan 29, 2026Updated last month
- A collection of phishing techniques used to evade detection. #nolockdown☆23Aug 28, 2025Updated 6 months ago
- Описывается чего и как настроено в моем рабочем окружении☆16Jan 27, 2022Updated 4 years ago
- Script for automating Linux memory capture and analysis☆13May 6, 2020Updated 5 years ago
- [ARCHIVED -- USE TXT2DETECTION] A command line tool that converts Sigma Rules into STIX 2.1 Objects.☆12Feb 19, 2026Updated 2 weeks ago
- Helps defenders find their WSUS configurations in the wake of CVE-2025-59287☆46Oct 28, 2025Updated 4 months ago
- This project aims to fine-tune a pre-trained LLM using CTI-specific data and evaluate its performance with CTIBench, a benchmark designed…☆17Sep 5, 2024Updated last year
- About PIVOting☆13Dec 19, 2023Updated 2 years ago
- Setting up a Windows Event Collector☆12Aug 7, 2023Updated 2 years ago
- ☆74Nov 28, 2025Updated 3 months ago
- Hobby simple kernel (x86-64) and bootloader (UEFI) written in C++.☆20Sep 23, 2024Updated last year
- An introduction to detection engineering☆14Jan 3, 2025Updated last year
- Portable utility to execute in memory a sequence of opcodes☆18Aug 28, 2016Updated 9 years ago
- A simple browser extension to blur or highlight elements on any webpage.☆28Sep 30, 2025Updated 5 months ago
- A free data collection and YARA scanning tool for cybersecurity incident investigation, compromise assessment and threat hunting☆20Nov 12, 2024Updated last year
- a keylogger for Windows. This is not meant for spying.☆18Jul 25, 2014Updated 11 years ago
- Abuse Zabbix API to obtain Remote Command Execution on hosts☆18Jun 4, 2021Updated 4 years ago
- ESP32 based Wi-Fi Intrusion Detection System☆28May 11, 2025Updated 9 months ago
- Malicious shortcut file builder for spear-phishing and red-team engagement.☆17Sep 11, 2023Updated 2 years ago
- Security Orchestration, Automation and Response for Security Analysts, published by Packt☆23Jan 24, 2025Updated last year
- Bitrix vulnerability scanner☆23Mar 28, 2023Updated 2 years ago
- A Windows 10 login phishing page for your red team exercises☆15Apr 25, 2021Updated 4 years ago
- 1C Exploit Kit☆78Dec 8, 2021Updated 4 years ago
- Введение в анализ данных и машинное обучение☆29Feb 2, 2018Updated 8 years ago
- BasicLDR: A Reflective DLL Loader☆14Jun 11, 2024Updated last year
- Offline AI Security Assistant for Air-Gapped Pentesting☆65Feb 22, 2026Updated last week
- Terminal on Browser☆28Jun 28, 2025Updated 8 months ago
- Understanding the operation and limitations of Sysmon's events☆23Sep 15, 2022Updated 3 years ago
- A memory scanner made in python for linux☆22Jun 6, 2021Updated 4 years ago
- Ansible role for installing Sysmon with popular config files included.☆24Jan 8, 2023Updated 3 years ago
- lnk_parser is a full rust implementation to parse windows LNK files☆23Feb 17, 2026Updated 2 weeks ago
- The Mimikatz Missing Manual☆344Feb 5, 2026Updated last month
- Client-side Encrypted Upload Server Python Script☆66Jul 10, 2025Updated 7 months ago
- KeePass 2.X dumper (CVE-2023-32784)☆27Nov 4, 2023Updated 2 years ago
- реп полезностей для PT MaxPatrol SIEM☆24Sep 18, 2023Updated 2 years ago
- The new name is DeTT&CT☆24Jul 8, 2019Updated 6 years ago