Automated detection rule analysis utility
☆29Sep 22, 2022Updated 3 years ago
Alternatives and similar repositories for dredd
Users that are interested in dredd are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Visual Studio Code Microsoft Sysinternal Sysmon configuration file extension.☆54Jul 13, 2023Updated 2 years ago
- ☆21May 10, 2023Updated 2 years ago
- ☆39Feb 12, 2020Updated 6 years ago
- A spiritual .NET equivalent to the Gargoyle memory scanning evasion technique☆52Dec 6, 2018Updated 7 years ago
- a short C code POC to gain persistence and evade sysmon event code registry (creation, update and deletion) REG_NOTIFY_CLASS Registry Cal…☆65Aug 23, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A test case runner for Sigma rules☆14Aug 14, 2024Updated last year
- ☆20Feb 22, 2021Updated 5 years ago
- VECTR is a tool that facilitates tracking of your red and blue team testing activities to measure detection and prevention capabilities a…☆1,569Apr 24, 2026Updated last week
- POC for utilizing wikipedia API for Command and Control☆29Dec 8, 2022Updated 3 years ago
- BloodHound Cypher Queries Ported to a Jupyter Notebook☆53Jun 20, 2020Updated 5 years ago
- 🚨ATTENTION🚨 The VERIS mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here …☆72Apr 3, 2024Updated 2 years ago
- 🛡️ VIPER: Stay ahead of threats with AI-driven vulnerability intelligence. Prioritize CVEs effectively using NVD, EPSS, CISA KEV, and Go…☆89Aug 13, 2025Updated 8 months ago
- An offensive toolkit for restless guests #DEFCON33☆59Aug 11, 2025Updated 8 months ago
- Credential Dumper☆80Feb 19, 2020Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Compilation of resources to help with Adversary Simulation automation harness☆100Aug 7, 2020Updated 5 years ago
- Microsoft decompiled IrDA drivers☆16Apr 15, 2015Updated 11 years ago
- STIX 2.1 Visualizer, Attack and Activity Thread Graph for Threat Modeling☆33Dec 9, 2024Updated last year
- ☆70Apr 16, 2026Updated 2 weeks ago
- Data and structures regarding the research done on WdFilter☆12Apr 15, 2020Updated 6 years ago
- ATT&CK Remote Threat Hunting Incident Response☆206Dec 8, 2024Updated last year
- an excel-centric approach for the MITRE ATT&CK® Tactics and Techniques☆188May 5, 2022Updated 3 years ago
- String extraction and classification tool for binary files, designed to extract only the strings that can be considered relevant (i.e. no…☆11Aug 9, 2020Updated 5 years ago
- Petaq - Purple Team Command & Control Server☆105Dec 8, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Automatically exported from code.google.com/p/guardlite☆11Jul 2, 2015Updated 10 years ago
- Repository resource threat intelligence for SOC☆10Sep 14, 2018Updated 7 years ago
- Threat hunting repo for my independent study on threat hunting with OSQuery☆27Jan 16, 2018Updated 8 years ago
- A mini project to exfiltrate data via QR codes☆19Dec 5, 2025Updated 4 months ago
- C# utility that uses WMI to run "cmd.exe /c netstat -n", save the output to a file, then use SMB to read and delete the file remotely☆39Jan 3, 2020Updated 6 years ago
- Threat Hunting & Incident Investigation with Osquery☆217Mar 30, 2022Updated 4 years ago
- Blog/Journal on how to backdoor VSCode extensions☆80Feb 24, 2026Updated 2 months ago
- Some of example code that I have collected while learning☆10Sep 25, 2016Updated 9 years ago
- nuke that event log using some epic dinvoke fu☆118May 12, 2021Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- pwncat windows c2 components☆22Jun 21, 2021Updated 4 years ago
- FOR508 Index - GCFA☆24May 19, 2018Updated 7 years ago
- ☆34Oct 16, 2025Updated 6 months ago
- Kills connections by process ID☆11Oct 21, 2018Updated 7 years ago
- Threat Simulation Indexes☆39Jan 9, 2026Updated 3 months ago
- C# Situational Awareness Script☆34Apr 26, 2019Updated 7 years ago
- The Shodan developer documentation covering the various APIs for Shodan, Exploits, Scanhub and anything else that's offered by Shodan.☆20Sep 16, 2013Updated 12 years ago