Automated detection rule analysis utility
☆29Sep 22, 2022Updated 3 years ago
Alternatives and similar repositories for dredd
Users that are interested in dredd are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Network timing evaluation used to detect beacons, works with argus flow as the source☆20May 4, 2016Updated 9 years ago
- Visual Studio Code Microsoft Sysinternal Sysmon configuration file extension.☆54Jul 13, 2023Updated 2 years ago
- A spiritual .NET equivalent to the Gargoyle memory scanning evasion technique☆52Dec 6, 2018Updated 7 years ago
- a short C code POC to gain persistence and evade sysmon event code registry (creation, update and deletion) REG_NOTIFY_CLASS Registry Cal…☆65Aug 23, 2023Updated 2 years ago
- ☆20Feb 22, 2021Updated 5 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- VECTR is a tool that facilitates tracking of your red and blue team testing activities to measure detection and prevention capabilities a…☆1,555Apr 3, 2026Updated last week
- POC for utilizing wikipedia API for Command and Control☆28Dec 8, 2022Updated 3 years ago
- BloodHound Cypher Queries Ported to a Jupyter Notebook☆53Jun 20, 2020Updated 5 years ago
- 🚨ATTENTION🚨 The VERIS mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here …☆72Apr 3, 2024Updated 2 years ago
- A standalone SIGMA-based detection tool for EVTX, Auditd and Sysmon for Linux logs☆801Updated this week
- 🛡️ VIPER: Stay ahead of threats with AI-driven vulnerability intelligence. Prioritize CVEs effectively using NVD, EPSS, CISA KEV, and Go…☆88Aug 13, 2025Updated 7 months ago
- An offensive toolkit for restless guests #DEFCON33☆53Aug 11, 2025Updated 8 months ago
- Docker compose Assemblyline 4 deployment (appliance and development)☆17Apr 1, 2026Updated last week
- Credential Dumper☆79Feb 19, 2020Updated 6 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Compilation of resources to help with Adversary Simulation automation harness☆100Aug 7, 2020Updated 5 years ago
- STIX 2.1 Visualizer, Attack and Activity Thread Graph for Threat Modeling☆33Dec 9, 2024Updated last year
- ☆66Mar 31, 2026Updated last week
- Data and structures regarding the research done on WdFilter☆12Apr 15, 2020Updated 5 years ago
- ATT&CK Remote Threat Hunting Incident Response☆206Dec 8, 2024Updated last year
- an excel-centric approach for the MITRE ATT&CK® Tactics and Techniques☆187May 5, 2022Updated 3 years ago
- Automatically exported from code.google.com/p/guardlite☆11Jul 2, 2015Updated 10 years ago
- Repository resource threat intelligence for SOC☆10Sep 14, 2018Updated 7 years ago
- Threat hunting repo for my independent study on threat hunting with OSQuery☆27Jan 16, 2018Updated 8 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A mini project to exfiltrate data via QR codes☆19Dec 5, 2025Updated 4 months ago
- C# utility that uses WMI to run "cmd.exe /c netstat -n", save the output to a file, then use SMB to read and delete the file remotely☆39Jan 3, 2020Updated 6 years ago
- Threat Hunting & Incident Investigation with Osquery☆217Mar 30, 2022Updated 4 years ago
- Enumerate AWS S3 buckets using different permutations☆17Jan 28, 2022Updated 4 years ago
- Blog/Journal on how to backdoor VSCode extensions☆80Feb 24, 2026Updated last month
- Some of example code that I have collected while learning☆10Sep 25, 2016Updated 9 years ago
- This repository contains attack chains generated by Aurora that can be reproduced in virtual environments.☆44Jan 25, 2026Updated 2 months ago
- nuke that event log using some epic dinvoke fu☆118May 12, 2021Updated 4 years ago
- pwncat windows c2 components☆22Jun 21, 2021Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- FOR508 Index - GCFA☆24May 19, 2018Updated 7 years ago
- Automatically exported from code.google.com/p/hf-2011☆15Feb 12, 2016Updated 10 years ago
- Kills connections by process ID☆11Oct 21, 2018Updated 7 years ago
- ☆10Dec 24, 2022Updated 3 years ago
- Threat Simulation Indexes☆39Jan 9, 2026Updated 3 months ago
- C# Situational Awareness Script☆34Apr 26, 2019Updated 6 years ago
- The Shodan developer documentation covering the various APIs for Shodan, Exploits, Scanhub and anything else that's offered by Shodan.☆20Sep 16, 2013Updated 12 years ago