Automated detection rule analysis utility
☆28Sep 22, 2022Updated 3 years ago
Alternatives and similar repositories for dredd
Users that are interested in dredd are comparing it to the libraries listed below
Sorting:
- Visual Studio Code Microsoft Sysinternal Sysmon configuration file extension.☆54Jul 13, 2023Updated 2 years ago
- The Shodan developer documentation covering the various APIs for Shodan, Exploits, Scanhub and anything else that's offered by Shodan.☆19Sep 16, 2013Updated 12 years ago
- Network timing evaluation used to detect beacons, works with argus flow as the source☆20May 4, 2016Updated 9 years ago
- A test case runner for Sigma rules☆14Aug 14, 2024Updated last year
- ☆19Apr 13, 2022Updated 3 years ago
- pwncat windows c2 components☆22Jun 21, 2021Updated 4 years ago
- ☆39Feb 12, 2020Updated 6 years ago
- Windows 权限提升 BadPotato☆14Jun 12, 2021Updated 4 years ago
- A mini project to exfiltrate data via QR codes☆19Dec 5, 2025Updated 2 months ago
- BloodHound Cypher Queries Ported to a Jupyter Notebook☆53Jun 20, 2020Updated 5 years ago
- ☆20Feb 22, 2021Updated 5 years ago
- ATT&CK Remote Threat Hunting Incident Response☆206Dec 8, 2024Updated last year
- FOR508 Index - GCFA☆24May 19, 2018Updated 7 years ago
- C# utility that uses WMI to run "cmd.exe /c netstat -n", save the output to a file, then use SMB to read and delete the file remotely☆38Jan 3, 2020Updated 6 years ago
- Threat Hunting & Incident Investigation with Osquery☆216Mar 30, 2022Updated 3 years ago
- a short C code POC to gain persistence and evade sysmon event code registry (creation, update and deletion) REG_NOTIFY_CLASS Registry Cal…☆65Aug 23, 2023Updated 2 years ago
- VECTR is a tool that facilitates tracking of your red and blue team testing activities to measure detection and prevention capabilities a…☆1,549Feb 10, 2026Updated 2 weeks ago
- A standalone SIGMA-based detection tool for EVTX, Auditd and Sysmon for Linux logs☆785Feb 22, 2026Updated last week
- 🚨ATTENTION🚨 The VERIS mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here …☆72Apr 3, 2024Updated last year
- Compilation of resources to help with Adversary Simulation automation harness☆100Aug 7, 2020Updated 5 years ago
- A repo containing tools developed by Carbon Black's Threat Research Team: Threat Analysis Unit☆240Jul 22, 2021Updated 4 years ago
- 🛡️ VIPER: Stay ahead of threats with AI-driven vulnerability intelligence. Prioritize CVEs effectively using NVD, EPSS, CISA KEV, and Go…☆85Aug 13, 2025Updated 6 months ago
- See adversary, do adversary: Simple execution of commands for defensive tuning/research (now with more ELF on the shelf)☆108Feb 12, 2023Updated 3 years ago
- A tool to assist with network-based hunting for GRU's Drovorub malware c2☆25Aug 28, 2020Updated 5 years ago
- an excel-centric approach for the MITRE ATT&CK® Tactics and Techniques☆187May 5, 2022Updated 3 years ago
- Threat hunting repo for my independent study on threat hunting with OSQuery☆27Jan 16, 2018Updated 8 years ago
- Petaq - Purple Team Command & Control Server☆105Dec 8, 2022Updated 3 years ago
- nuke that event log using some epic dinvoke fu☆118May 12, 2021Updated 4 years ago
- POC for utilizing wikipedia API for Command and Control☆28Dec 8, 2022Updated 3 years ago
- List of Awesome Vertex Synapse Resources☆28Aug 6, 2024Updated last year
- Public release of Whalehoney Honeypot☆29Mar 21, 2022Updated 3 years ago
- Use md5-collisions to make evil executables looking like a good one.☆34Apr 23, 2020Updated 5 years ago
- This repository contains attack chains generated by Aurora that can be reproduced in virtual environments.☆43Jan 25, 2026Updated last month
- SharpShareFinder is a minimalistic network share discovery POC designed to enumerate shares in Windows Active Directory networks leveragi…☆36Jul 10, 2024Updated last year
- winAFL patch to enable network-based apps fuzzing☆37Sep 14, 2018Updated 7 years ago
- ☆33Oct 16, 2025Updated 4 months ago
- Sigma is Generic Signature Format for SIEM Systems written by Florian Roth @Neo23x0 and Thomas Patzke. This repository is providing sprea…☆33Oct 16, 2019Updated 6 years ago
- Actionable analytics designed to combat threats☆1,005May 25, 2022Updated 3 years ago
- Proper Payload Protection Prevents Poor Performance☆76Jul 27, 2022Updated 3 years ago