Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis.
β516Feb 16, 2026Updated 2 weeks ago
Alternatives and similar repositories for rita
Users that are interested in rita are comparing it to the libraries listed below
Sorting:
- Fast and easy to use CLI-based file encryption program π¦β13Oct 12, 2025Updated 4 months ago
- PoC shadow SaaS and insecure credential detection system using a browser extension.β42Feb 8, 2026Updated 3 weeks ago
- Web Server Vulnerability Scanning Toolβ36Mar 11, 2025Updated 11 months ago
- Nakamoto is a 2 layer encryption tool to protect your data and your cyptocurrencyβ15Nov 13, 2025Updated 3 months ago
- π EclipseRecon is a personal project developed during my cybersecurity learning journey π‘οΈ. It helps practice web reconnaissance π by β¦β28Nov 26, 2025Updated 3 months ago
- Hayabusa (ιΌ) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.β3,037Updated this week
- Protection against HTML smuggling attacks.β101Jul 10, 2025Updated 7 months ago
- Security tool against dependency typosquatting attacksβ54Updated this week
- A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Inteβ¦β1,314Nov 12, 2025Updated 3 months ago
- π₯οΈ Windows π A Windows tool for emergency privacy: instantly deletes sensitive data and active logins to protect my information during β¦β54Jan 26, 2026Updated last month
- Framework for Monitoring File Ingestion Source for Yara Matchesβ50Mar 10, 2025Updated 11 months ago
- Threat-hunting tool for Linuxβ1,043Feb 16, 2026Updated 2 weeks ago
- Rapidly Search and Hunt through Windows Forensic Artefactsβ3,452Feb 14, 2026Updated 2 weeks ago
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passworβ¦β40May 7, 2023Updated 2 years ago
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearchβ80Feb 9, 2026Updated 2 weeks ago
- A resource containing all the tools each ransomware gangs usesβ1,330Dec 24, 2025Updated 2 months ago
- Tools for simulating threatsβ200Oct 27, 2023Updated 2 years ago
- Assortment of scripts and tools for our Blackhat EU 2024 talkβ105Feb 6, 2025Updated last year
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extracβ¦β150Sep 21, 2024Updated last year
- An index of publicly available and open-source threat detection rulesets.β130Apr 17, 2025Updated 10 months ago
- one-stop resource for all things offensive security.β177Feb 21, 2026Updated last week
- CloudGrappler is a purpose-built tool designed for effortless querying of high-fidelity and single-event detections related to well-knownβ¦β266Nov 21, 2025Updated 3 months ago
- AuditForge is a pentest reporting application making it simple and easy to write your findings and generate a customizable report.β79Sep 1, 2025Updated 6 months ago
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor manβs SOC.β56Oct 22, 2025Updated 4 months ago
- PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detectionβ¦β725Feb 14, 2026Updated 2 weeks ago
- A C++ tool for process memory scanning & suspicious telemetry generation that attempts to detect a number of malicious techniques used byβ¦β86May 13, 2024Updated last year
- SharpEye: Advanced Linux Intrusion Detection and Threat Hunting Systemβ176Feb 20, 2026Updated last week
- Email enumerator, username generator, and context validator for hunter.io, snov.io, and skrapp.ioβ84Aug 5, 2024Updated last year
- Live Feed of C2 servers, tools, and botnetsβ749Feb 23, 2026Updated last week
- God Mode Detection Rulesβ133Aug 8, 2024Updated last year
- Main Sigma Rule Repositoryβ10,145Feb 19, 2026Updated last week
- BlueSky OSINT Toolβ14Dec 10, 2024Updated last year
- Digging Deeper....β3,784Updated this week
- This project aims to compare and evaluate the telemetry of various EDR products.β1,927Jan 20, 2026Updated last month
- Small and highly portable detection tests based on MITRE's ATT&CK.β11,617Feb 23, 2026Updated last week
- Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of parβ¦β253Nov 18, 2024Updated last year
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessmentsβ142Jan 2, 2025Updated last year
- UAC is a powerful and extensible incident response tool designed for forensic investigators, security analysts, and IT professionals. It β¦β1,242Feb 18, 2026Updated last week
- β23Mar 4, 2025Updated 11 months ago