Endpoint detection for remote hosts for consumption by RITA and Elasticsearch
☆80Feb 9, 2026Updated 2 weeks ago
Alternatives and similar repositories for espy
Users that are interested in espy are comparing it to the libraries listed below
Sorting:
- Beacon Kibana Executable Report. Aggregates Sysmon Network Events With Elasticsearch and Kibana☆299Feb 9, 2026Updated 2 weeks ago
- Extracts fields from zeek logs, compatible with zeek-cut☆26Jul 10, 2024Updated last year
- Passive service locator, a python sniffer that identifies servers, clients, names and much more☆258Feb 9, 2026Updated 2 weeks ago
- Tools for simulating threats☆200Oct 27, 2023Updated 2 years ago
- a port made of honey for blocking people☆13Jun 24, 2020Updated 5 years ago
- Credential and Red Teaming Defense for Windows Environments☆330Jul 17, 2024Updated last year
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,516Jan 12, 2026Updated last month
- an awesome list of active defense resources☆129Jul 11, 2020Updated 5 years ago
- The PoLRBear Project☆35Mar 12, 2021Updated 4 years ago
- Device profile: Define acceptable amounts of traffic for your devices and see a report of outliers.☆16Jan 28, 2020Updated 6 years ago
- Threat Hunting Toolkit is a Swiss Army knife for threat hunting, log processing, and security-focused data science☆150Feb 1, 2026Updated last month
- ☆13Oct 7, 2019Updated 6 years ago
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆208Jul 21, 2022Updated 3 years ago
- Parses BGP/AS data from multiple different sources☆11Dec 4, 2021Updated 4 years ago
- ☆37Dec 17, 2020Updated 5 years ago
- ☆12Feb 16, 2017Updated 9 years ago
- Common code, such as validators and mixins, that are shared between ActiveModels in metasploit-framework and ActiveRecords in metasploit_…☆14May 2, 2025Updated 9 months ago
- Posture Attribute Collection and Evaluation☆23Jun 20, 2023Updated 2 years ago
- This tool aims at parsing Microsoft Protection logs to provide relevant data to forensic analysts during incident responses.☆21Sep 30, 2022Updated 3 years ago
- ☆12Aug 3, 2022Updated 3 years ago
- Collection of walkthroughs on various threat hunting techniques☆76Aug 3, 2020Updated 5 years ago
- A tool to display Windows Event logs as they happen.☆14Sep 19, 2023Updated 2 years ago
- Create machine images containing the Nessus vulnerability scanner☆13Feb 18, 2026Updated last week
- Hundred Days of Yara Challenge☆12Jun 21, 2022Updated 3 years ago
- Thor Artifacts for Velociraptor☆19Dec 2, 2025Updated 2 months ago
- ☆26Jun 22, 2022Updated 3 years ago
- ☆20May 30, 2025Updated 9 months ago
- Training scenarios for cyber ranges☆15Apr 24, 2020Updated 5 years ago
- A set of templates for documenting threat intelligence☆75Feb 28, 2013Updated 13 years ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Apr 18, 2020Updated 5 years ago
- Artifacts of the USENIX Security 2022 paper "Spoki: Unveiling a New Wave of Scanners through a Reactive Network Telescope"☆18Dec 8, 2024Updated last year
- A PoC backdoor that uses Gmail as a C&C server☆13Jun 28, 2020Updated 5 years ago
- ☆16Jan 27, 2026Updated last month
- Ansible role for security standards compliance☆13Mar 6, 2019Updated 6 years ago
- Automatic detection engineering technical state compliance☆55Jul 7, 2024Updated last year
- Run zeek with zeekctl in docker☆63Sep 12, 2024Updated last year
- DefectDojo Community Content☆18Nov 9, 2025Updated 3 months ago
- Automated process to build and distribute Posture & Exposure Reports' bi-weekly to customers.☆16Jul 16, 2025Updated 7 months ago
- API public documentation☆10Dec 17, 2018Updated 7 years ago