Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis.
β552Apr 2, 2026Updated last month
Alternatives and similar repositories for rita
Users that are interested in rita are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Fast and easy to use CLI-based file encryption program π¦β13Oct 12, 2025Updated 6 months ago
- β17Mar 24, 2026Updated last month
- Web Server Vulnerability Scanning Toolβ37Mar 11, 2025Updated last year
- PoC shadow SaaS and insecure credential detection system using a browser extension.β43Apr 3, 2026Updated last month
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearchβ81Mar 19, 2026Updated last month
- AI Agents on DigitalOcean Gradient AI Platform β’ AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Nakamoto is a 2 layer encryption tool to protect your data and your cyptocurrencyβ16Apr 8, 2026Updated 3 weeks ago
- Tools for simulating threatsβ203Oct 27, 2023Updated 2 years ago
- Hayabusa (ιΌ) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.β3,135Updated this week
- π EclipseRecon is a personal project developed during my cybersecurity learning journey π‘οΈ. It helps practice web reconnaissance π by β¦β30Nov 26, 2025Updated 5 months ago
- Protection against HTML smuggling attacks.β101Jul 10, 2025Updated 9 months ago
- Rapidly Search and Hunt through Windows Forensic Artefactsβ3,523Apr 1, 2026Updated last month
- A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Inteβ¦β1,367Nov 12, 2025Updated 5 months ago
- π₯οΈ Windows π A Windows tool for emergency privacy: instantly deletes sensitive data and active logins to protect my information during β¦β56Updated this week
- Assortment of scripts and tools for our Blackhat EU 2024 talkβ105Feb 6, 2025Updated last year
- Serverless GPU API endpoints on Runpod - Get Bonus Credits β’ AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Main Sigma Rule Repositoryβ10,355Apr 24, 2026Updated last week
- PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detectionβ¦β732Apr 2, 2026Updated last month
- Small and highly portable detection tests based on MITRE's ATT&CK.β11,860Apr 24, 2026Updated last week
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passworβ¦β42May 7, 2023Updated 2 years ago
- Threat-hunting tool for Linuxβ1,057Updated this week
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessmentsβ143Jan 2, 2025Updated last year
- BlueSky OSINT Toolβ15Dec 10, 2024Updated last year
- one-stop resource for all things offensive security.β179Apr 21, 2026Updated last week
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysisβ¦β2,511Jan 12, 2026Updated 3 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer β’ AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Framework for Monitoring File Ingestion Source for Yara Matchesβ52Mar 10, 2025Updated last year
- β24Mar 4, 2025Updated last year
- A C++ tool for process memory scanning & suspicious telemetry generation that attempts to detect a number of malicious techniques used byβ¦β88May 13, 2024Updated last year
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extracβ¦β151Sep 21, 2024Updated last year
- An index of publicly available and open-source threat detection rulesets.β133Apr 17, 2025Updated last year
- Threat Hunting Toolkit is a Swiss Army knife for threat hunting, log processing, and security-focused data scienceβ152Apr 1, 2026Updated last month
- A resource containing all the tools each ransomware gangs usesβ1,355Apr 1, 2026Updated last month
- Digging Deeper....β3,936Updated this week
- Security tool against dependency typosquatting attacksβ56Updated this week
- Deploy to Railway using AI coding agents - Free Credits Offer β’ AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- PowerShell Digital Forensics & Incident Response Scripts.β782Jan 14, 2026Updated 3 months ago
- Email enumerator, username generator, and context validator for hunter.io, snov.io, and skrapp.ioβ83Aug 5, 2024Updated last year
- God Mode Detection Rulesβ132Aug 8, 2024Updated last year
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor manβs SOC.β56Oct 22, 2025Updated 6 months ago
- AuditForge is a pentest reporting application making it simple and easy to write your findings and generate a customizable report.β78Sep 1, 2025Updated 8 months ago
- Sabonis, a Digital Forensics and Incident Response pivoting toolβ19Mar 3, 2022Updated 4 years ago
- This project aims to compare and evaluate the telemetry of various EDR products.β1,948Apr 24, 2026Updated last week