Automated detection rule analysis utility
☆29Sep 22, 2022Updated 3 years ago
Alternatives and similar repositories for dredd
Users that are interested in dredd are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Network timing evaluation used to detect beacons, works with argus flow as the source☆20May 4, 2016Updated 10 years ago
- Visual Studio Code Microsoft Sysinternal Sysmon configuration file extension.☆54Jul 13, 2023Updated 2 years ago
- ☆21May 10, 2023Updated 3 years ago
- ☆19Apr 13, 2022Updated 4 years ago
- A spiritual .NET equivalent to the Gargoyle memory scanning evasion technique☆52Dec 6, 2018Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- a short C code POC to gain persistence and evade sysmon event code registry (creation, update and deletion) REG_NOTIFY_CLASS Registry Cal…☆65Aug 23, 2023Updated 2 years ago
- A test case runner for Sigma rules☆14Aug 14, 2024Updated last year
- ☆20Feb 22, 2021Updated 5 years ago
- VECTR is a tool that facilitates tracking of your red and blue team testing activities to measure detection and prevention capabilities a…☆1,570Apr 24, 2026Updated 3 weeks ago
- POC for utilizing wikipedia API for Command and Control☆29Dec 8, 2022Updated 3 years ago
- 🚨ATTENTION🚨 The VERIS mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here …☆72Apr 3, 2024Updated 2 years ago
- A standalone SIGMA-based detection tool for EVTX, Auditd and Sysmon for Linux logs☆812Updated this week
- An offensive toolkit for restless guests #DEFCON33☆59Aug 11, 2025Updated 9 months ago
- Credential Dumper☆80Feb 19, 2020Updated 6 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- 🛡️ VIPER: Stay ahead of threats with AI-driven vulnerability intelligence. Prioritize CVEs effectively using NVD, EPSS, CISA KEV, and Go…☆90Aug 13, 2025Updated 9 months ago
- Compilation of resources to help with Adversary Simulation automation harness☆100Aug 7, 2020Updated 5 years ago
- STIX 2.1 Visualizer, Attack and Activity Thread Graph for Threat Modeling☆33Dec 9, 2024Updated last year
- ATT&CK Remote Threat Hunting Incident Response☆203Dec 8, 2024Updated last year
- an excel-centric approach for the MITRE ATT&CK® Tactics and Techniques☆188May 5, 2022Updated 4 years ago
- String extraction and classification tool for binary files, designed to extract only the strings that can be considered relevant (i.e. no…☆11Aug 9, 2020Updated 5 years ago
- Petaq - Purple Team Command & Control Server☆104Dec 8, 2022Updated 3 years ago
- Repository resource threat intelligence for SOC☆10Sep 14, 2018Updated 7 years ago
- A mini project to exfiltrate data via QR codes☆19Dec 5, 2025Updated 5 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- C# utility that uses WMI to run "cmd.exe /c netstat -n", save the output to a file, then use SMB to read and delete the file remotely☆39Jan 3, 2020Updated 6 years ago
- Threat Hunting & Incident Investigation with Osquery☆219Mar 30, 2022Updated 4 years ago
- Some of example code that I have collected while learning☆10Sep 25, 2016Updated 9 years ago
- Blog/Journal on how to backdoor VSCode extensions☆80Feb 24, 2026Updated 2 months ago
- pwncat windows c2 components☆22Jun 21, 2021Updated 4 years ago
- FOR508 Index - GCFA☆25May 19, 2018Updated 8 years ago
- POC for a race condition exploit using directory junctions in Windows☆17Apr 26, 2020Updated 6 years ago
- ☆34Oct 16, 2025Updated 7 months ago
- ☆10Dec 24, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Threat Simulation Indexes☆39Jan 9, 2026Updated 4 months ago
- C# Situational Awareness Script☆34Apr 26, 2019Updated 7 years ago
- The Shodan developer documentation covering the various APIs for Shodan, Exploits, Scanhub and anything else that's offered by Shodan.☆21Sep 16, 2013Updated 12 years ago
- Re-play Security Events☆1,753Mar 20, 2024Updated 2 years ago
- See adversary, do adversary: Simple execution of commands for defensive tuning/research (now with more ELF on the shelf)☆109Feb 12, 2023Updated 3 years ago
- ☆20Nov 7, 2023Updated 2 years ago
- SharpShareFinder is a minimalistic network share discovery POC designed to enumerate shares in Windows Active Directory networks leveragi…☆36Jul 10, 2024Updated last year