Detection rule validation
☆40Oct 25, 2023Updated 2 years ago
Alternatives and similar repositories for detection-validation
Users that are interested in detection-validation are comparing it to the libraries listed below
Sorting:
- A small crappy script I wrote that converts the Sigma Windows Process Creation events to KQL via PySigma. Designed for CI/CD☆10Nov 7, 2023Updated 2 years ago
- Recordization library☆11Updated this week
- Kaseya REvil CNC domains☆12Jan 30, 2024Updated 2 years ago
- Thor Artifacts for Velociraptor☆19Dec 2, 2025Updated 3 months ago
- General Content☆25Dec 23, 2025Updated 2 months ago
- A full analysis report detailing as much as possible of a Malware or a Threat☆31Jan 30, 2026Updated last month
- Baseline a Windows System against LOLBAS☆72Feb 2, 2026Updated last month
- Bash tool used for proactive detection of malicious activity on macOS systems.☆39Sep 29, 2025Updated 5 months ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆28Apr 22, 2023Updated 2 years ago
- ☆12Jul 15, 2022Updated 3 years ago
- ☆12Jul 27, 2020Updated 5 years ago
- Security Content for the PEAK Threat Hunting Framework☆44Feb 15, 2024Updated 2 years ago
- Pushes Sysmon Configs☆90Jun 11, 2021Updated 4 years ago
- SACTI - Securely aggregate CTI sightings and report them on MISP☆14Oct 24, 2022Updated 3 years ago
- WebDirScan is a tool for brute-forcing URIs (directories and files) on web servers by taking input directory to scan for files & director…☆11Mar 31, 2023Updated 2 years ago
- Automated Cloud Misconfiguration Testing☆22Jun 20, 2025Updated 8 months ago
- ☆12May 31, 2023Updated 2 years ago
- A small and portable Windows C library for sandbox detection☆35Oct 2, 2023Updated 2 years ago
- DNS over HTTPS targeted malware (only runs once)☆96Aug 16, 2023Updated 2 years ago
- Create a cool process tree like https://twitter.com/ACEResponder.☆35Mar 1, 2023Updated 3 years ago
- 1000 black hat tools Collected From github☆16Nov 28, 2019Updated 6 years ago
- Hacking tool for enumeration and automated attacking. Port Scanner, Automatic SSH brute, DNS queries, IP and phonenumber geolocation☆14May 25, 2023Updated 2 years ago
- secure file sharing personal server☆19Sep 12, 2022Updated 3 years ago
- Malkom is an extensible and simple similarity graph generator for malware analysis aimed at helping analysts visualize and cluster sets o…☆17Apr 6, 2023Updated 2 years ago
- A few XDR Scripts☆22Mar 19, 2025Updated 11 months ago
- ☆19Mar 4, 2023Updated 3 years ago
- This is a simple example of DLL hijacking enabling proxy execution.☆70Apr 18, 2023Updated 2 years ago
- Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero an…☆31Jun 19, 2023Updated 2 years ago
- nmap/ndiff based scanner with template based notification system in case of infrastructure changes☆19Feb 16, 2018Updated 8 years ago
- My journey and notes on learning Offensive Security from the ground up☆21Dec 22, 2025Updated 2 months ago
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆77Nov 12, 2023Updated 2 years ago
- Single file php webshell scanner to detect potentially malicious backdoor based on token and hash with web interface☆79Feb 25, 2026Updated last week
- Python based CLI for MalwareBazaar☆39Jul 22, 2025Updated 7 months ago
- Modules for my C2 course students to use for their own projects.☆73Jun 13, 2023Updated 2 years ago
- Collections of Quark Script that detect vulnerabilities in the binaries.☆20Aug 31, 2025Updated 6 months ago
- Burp extension used to snip any header from all the requests.☆23Nov 12, 2023Updated 2 years ago
- VBScript & VBA source-to-source deobfuscator with partial-evaluation☆80Aug 7, 2024Updated last year
- ☆15Nov 25, 2021Updated 4 years ago
- Automated Active Directory lab running on Proxmox☆88Aug 8, 2025Updated 6 months ago