Endpoint detection for remote hosts for consumption by RITA and Elasticsearch
☆81Mar 19, 2026Updated last month
Alternatives and similar repositories for espy
Users that are interested in espy are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Beacon Kibana Executable Report. Aggregates Sysmon Network Events With Elasticsearch and Kibana☆303Mar 19, 2026Updated last month
- Extracts fields from zeek logs, compatible with zeek-cut☆27Jul 10, 2024Updated last year
- Passive service locator, a python sniffer that identifies servers, clients, names and much more☆262Feb 9, 2026Updated 2 months ago
- Tools for simulating threats☆203Oct 27, 2023Updated 2 years ago
- a port made of honey for blocking people☆13Jun 24, 2020Updated 5 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Passive OS detection based on SYN packets without Transmitting any Data☆50Mar 29, 2023Updated 3 years ago
- The PoLRBear Project☆35Mar 12, 2021Updated 5 years ago
- Credential and Red Teaming Defense for Windows Environments☆330Jul 17, 2024Updated last year
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,510Jan 12, 2026Updated 3 months ago
- Threat Hunting Toolkit is a Swiss Army knife for threat hunting, log processing, and security-focused data science☆152Apr 1, 2026Updated last month
- ☆46Jun 1, 2025Updated 10 months ago
- ☆37Dec 17, 2020Updated 5 years ago
- Collection of walkthroughs on various threat hunting techniques☆77Aug 3, 2020Updated 5 years ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆548Apr 2, 2026Updated 3 weeks ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- an awesome list of active defense resources☆129Jul 11, 2020Updated 5 years ago
- Powershell / C# based cross platform forensic framework based for live incident response☆23Jul 5, 2020Updated 5 years ago
- Device profile: Define acceptable amounts of traffic for your devices and see a report of outliers.☆16Jan 28, 2020Updated 6 years ago
- ☆13Oct 7, 2019Updated 6 years ago
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆209Jul 21, 2022Updated 3 years ago
- ☆16May 13, 2021Updated 4 years ago
- A PoC backdoor that uses Gmail as a C&C server☆13Jun 28, 2020Updated 5 years ago
- A CLI tool for managing Chronicle user workflows☆18Apr 13, 2026Updated 2 weeks ago
- Single sign-on using SSH key pairs and fine-grained remote command authorization☆16Mar 15, 2024Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Thor Artifacts for Velociraptor☆19Dec 2, 2025Updated 4 months ago
- The Fastest way to consume Threat Intel☆26Apr 30, 2022Updated 4 years ago
- A USB armory based USB sandbox☆22Jun 14, 2017Updated 8 years ago
- PowerShell tool to triage systems☆12May 17, 2023Updated 2 years ago
- Security Onion + Automation + Response Lab including n8n and Velociraptor☆114Sep 14, 2022Updated 3 years ago
- This is automation tool which utilize 2 sub -domain finder and then sort out working sub-domain and finally scan for sub-doamin TAKEOVER.☆11May 6, 2023Updated 2 years ago
- Use DNS to hunt for threats including DGAs☆15Jan 4, 2016Updated 10 years ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆13Apr 18, 2020Updated 6 years ago
- ☆17Mar 24, 2026Updated last month
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆227Nov 9, 2023Updated 2 years ago
- Cyber Threats Detection Rules☆14Sep 16, 2025Updated 7 months ago
- Tool used to perform threat intelligence against packet data☆36Jan 26, 2025Updated last year
- Automatic detection engineering technical state compliance☆55Jul 7, 2024Updated last year
- An Active Defense and EDR software to empower Blue Teams☆1,325Mar 31, 2026Updated last month
- All-in-one bundle of MISP, TheHive and Cortex☆168Sep 27, 2022Updated 3 years ago
- LinkedIn reconnaissance tool☆54Dec 17, 2021Updated 4 years ago