Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis.
β546Apr 2, 2026Updated last week
Alternatives and similar repositories for rita
Users that are interested in rita are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- β16Mar 24, 2026Updated 2 weeks ago
- Fast and easy to use CLI-based file encryption program π¦β13Oct 12, 2025Updated 6 months ago
- Web Server Vulnerability Scanning Toolβ36Mar 11, 2025Updated last year
- PoC shadow SaaS and insecure credential detection system using a browser extension.β42Apr 3, 2026Updated last week
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearchβ79Mar 19, 2026Updated 3 weeks ago
- DigitalOcean Gradient AI Platform β’ AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Nakamoto is a 2 layer encryption tool to protect your data and your cyptocurrencyβ15Nov 13, 2025Updated 5 months ago
- Tools for simulating threatsβ203Oct 27, 2023Updated 2 years ago
- Hayabusa (ιΌ) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.β3,106Mar 21, 2026Updated 3 weeks ago
- π EclipseRecon is a personal project developed during my cybersecurity learning journey π‘οΈ. It helps practice web reconnaissance π by β¦β29Nov 26, 2025Updated 4 months ago
- Protection against HTML smuggling attacks.β101Jul 10, 2025Updated 9 months ago
- Rapidly Search and Hunt through Windows Forensic Artefactsβ3,497Apr 1, 2026Updated last week
- A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Inteβ¦β1,347Nov 12, 2025Updated 5 months ago
- π₯οΈ Windows π A Windows tool for emergency privacy: instantly deletes sensitive data and active logins to protect my information during β¦β54Jan 26, 2026Updated 2 months ago
- Assortment of scripts and tools for our Blackhat EU 2024 talkβ105Feb 6, 2025Updated last year
- End-to-end encrypted email - Proton Mail β’ AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Main Sigma Rule Repositoryβ10,279Apr 1, 2026Updated last week
- PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detectionβ¦β728Apr 2, 2026Updated last week
- Small and highly portable detection tests based on MITRE's ATT&CK.β11,771Mar 30, 2026Updated last week
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passworβ¦β41May 7, 2023Updated 2 years ago
- Threat-hunting tool for Linuxβ1,053Updated this week
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessmentsβ142Jan 2, 2025Updated last year
- BlueSky OSINT Toolβ14Dec 10, 2024Updated last year
- Threat Hunting Toolkit is a Swiss Army knife for threat hunting, log processing, and security-focused data scienceβ152Apr 1, 2026Updated last week
- one-stop resource for all things offensive security.β179Feb 21, 2026Updated last month
- 1-Click AI Models by DigitalOcean Gradient β’ AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysisβ¦β2,513Jan 12, 2026Updated 3 months ago
- β23Mar 4, 2025Updated last year
- Framework for Monitoring File Ingestion Source for Yara Matchesβ51Mar 10, 2025Updated last year
- An index of publicly available and open-source threat detection rulesets.β130Apr 17, 2025Updated 11 months ago
- A C++ tool for process memory scanning & suspicious telemetry generation that attempts to detect a number of malicious techniques used byβ¦β88May 13, 2024Updated last year
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extracβ¦β151Sep 21, 2024Updated last year
- Digging Deeper....β3,889Updated this week
- A resource containing all the tools each ransomware gangs usesβ1,343Apr 1, 2026Updated last week
- Security tool against dependency typosquatting attacksβ55Updated this week
- End-to-end encrypted cloud storage - Proton Drive β’ AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- PowerShell Digital Forensics & Incident Response Scripts.β781Jan 14, 2026Updated 2 months ago
- Email enumerator, username generator, and context validator for hunter.io, snov.io, and skrapp.ioβ83Aug 5, 2024Updated last year
- God Mode Detection Rulesβ132Aug 8, 2024Updated last year
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor manβs SOC.β56Oct 22, 2025Updated 5 months ago
- AuditForge is a pentest reporting application making it simple and easy to write your findings and generate a customizable report.β78Sep 1, 2025Updated 7 months ago
- Sabonis, a Digital Forensics and Incident Response pivoting toolβ19Mar 3, 2022Updated 4 years ago
- This project aims to compare and evaluate the telemetry of various EDR products.β1,942Mar 26, 2026Updated 2 weeks ago