Endpoint detection for remote hosts for consumption by RITA and Elasticsearch
☆79Mar 19, 2026Updated 3 weeks ago
Alternatives and similar repositories for espy
Users that are interested in espy are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Beacon Kibana Executable Report. Aggregates Sysmon Network Events With Elasticsearch and Kibana☆302Mar 19, 2026Updated 3 weeks ago
- Extracts fields from zeek logs, compatible with zeek-cut☆27Jul 10, 2024Updated last year
- Passive service locator, a python sniffer that identifies servers, clients, names and much more☆260Feb 9, 2026Updated 2 months ago
- Tools for simulating threats☆203Oct 27, 2023Updated 2 years ago
- a port made of honey for blocking people☆13Jun 24, 2020Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Passive OS detection based on SYN packets without Transmitting any Data☆50Mar 29, 2023Updated 3 years ago
- The PoLRBear Project☆35Mar 12, 2021Updated 5 years ago
- Credential and Red Teaming Defense for Windows Environments☆330Jul 17, 2024Updated last year
- Threat Hunting Toolkit is a Swiss Army knife for threat hunting, log processing, and security-focused data science☆152Apr 1, 2026Updated last week
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,511Jan 12, 2026Updated 2 months ago
- Collection of walkthroughs on various threat hunting techniques☆77Aug 3, 2020Updated 5 years ago
- ☆45Jun 1, 2025Updated 10 months ago
- ☆37Dec 17, 2020Updated 5 years ago
- Tools by cooey comrades for cooey comrades.☆16Feb 23, 2023Updated 3 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆541Apr 2, 2026Updated last week
- an awesome list of active defense resources☆129Jul 11, 2020Updated 5 years ago
- Powershell / C# based cross platform forensic framework based for live incident response☆23Jul 5, 2020Updated 5 years ago
- Device profile: Define acceptable amounts of traffic for your devices and see a report of outliers.☆16Jan 28, 2020Updated 6 years ago
- ☆13Oct 7, 2019Updated 6 years ago
- ☆16Mar 24, 2026Updated 2 weeks ago
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆209Jul 21, 2022Updated 3 years ago
- ☆16May 13, 2021Updated 4 years ago
- A PoC backdoor that uses Gmail as a C&C server☆13Jun 28, 2020Updated 5 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A modular OSINT honeypot for blue teamers☆346May 2, 2023Updated 2 years ago
- A CLI tool for managing Chronicle user workflows☆18Sep 24, 2025Updated 6 months ago
- Single sign-on using SSH key pairs and fine-grained remote command authorization☆16Mar 15, 2024Updated 2 years ago
- Thor Artifacts for Velociraptor☆19Dec 2, 2025Updated 4 months ago
- OpenVAS plugin for GLPi☆13Mar 22, 2022Updated 4 years ago
- To open "issues" for LiveRaizo ( https://sourceforge.net/projects/live-raizo/ )☆31Jan 25, 2026Updated 2 months ago
- Repository for Zabbix Microsoft 365 Monitoring☆14Jul 11, 2025Updated 8 months ago
- The Fastest way to consume Threat Intel☆26Apr 30, 2022Updated 3 years ago
- A USB armory based USB sandbox☆22Jun 14, 2017Updated 8 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- PowerShell tool to triage systems☆12May 17, 2023Updated 2 years ago
- Security Onion + Automation + Response Lab including n8n and Velociraptor☆114Sep 14, 2022Updated 3 years ago
- Use DNS to hunt for threats including DGAs☆15Jan 4, 2016Updated 10 years ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Apr 18, 2020Updated 5 years ago
- ☆228Nov 9, 2023Updated 2 years ago
- Cyber Threats Detection Rules☆14Sep 16, 2025Updated 6 months ago
- Collections of RouterOS scripts mainly for Routeros v7☆13Dec 3, 2024Updated last year