Detection Engineering Tools
☆24Updated this week
Alternatives and similar repositories for Detection_Engineering_Tools
Users that are interested in Detection_Engineering_Tools are comparing it to the libraries listed below
Sorting:
- Short Python script for parsing Defender VDM signature files.☆10Sep 22, 2024Updated last year
- Are you able to use open source intelligence to solve this challenge?☆11Apr 14, 2019Updated 6 years ago
- ☆12Jul 15, 2022Updated 3 years ago
- Obfuscate payloads using IPv4, IPv6, MAC or UUID strings☆23Feb 17, 2024Updated 2 years ago
- Rule Engine for Dynamic Malware Analysis and Research☆25Apr 16, 2025Updated 10 months ago
- SightingDB is a database for Sightings☆22Jun 21, 2023Updated 2 years ago
- ☆48Nov 26, 2025Updated 3 months ago
- AI-Powered, Local Pythonic Coding Agent 🐞💻☆24Mar 3, 2025Updated 11 months ago
- TTPMapper is an AI-driven threat intelligence parser that converts unstructured reports whether from web URLs or PDF files into structure…☆51Jun 21, 2025Updated 8 months ago
- A browser extension for threat hunting that provides one UI for different SIEMs/EDRs and simplifies investigation☆77May 21, 2024Updated last year
- A console debugger using DbgX and Terminal.Gui☆30Oct 12, 2022Updated 3 years ago
- Raspberry Pi powered Digital Clock for Amateur Radio using TM1637 4 digit displays☆11Mar 20, 2021Updated 4 years ago
- A Linux x86/x86-64 tool to trace registers and memory regions.☆40Jun 9, 2022Updated 3 years ago
- Dalamud Plugin that synchronizes your character data to one main character.☆15Jul 11, 2024Updated last year
- Intel 64/Windows low-level experiments☆63Aug 25, 2025Updated 6 months ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆41Oct 25, 2021Updated 4 years ago
- Adversarial Interception Mission Oriented Discovery and Disruption Framework, or AIMOD2, is a structured threat hunting approach to proac…☆90Sep 16, 2023Updated 2 years ago
- Jupyter Notebooks for the Blue Team☆39Jan 16, 2025Updated last year
- It's a handy tool to help you analyze malware. You can use this tool to query your malware samples using different hashes or find all oth…☆20Jul 22, 2025Updated 7 months ago
- An HTTP proxy library for Go☆17Jun 22, 2022Updated 3 years ago
- ☆13Mar 28, 2024Updated last year
- Python script to send SMS using Huawei new[er] USB dongles via the HTTP interface☆11Jul 10, 2017Updated 8 years ago
- Plugin interface for remote communications with Binary Ninja database and MCP server for interfacing with LLMs.☆59Feb 21, 2026Updated last week
- Are WiFi Passwords we use these day's actually safe?☆10Mar 7, 2017Updated 8 years ago
- Install AAB is a script that helps with installing an AAB file into a connected Android device☆13Feb 7, 2024Updated 2 years ago
- Tracks cross references and allows fast viewing of pseudocode between references☆13Mar 10, 2025Updated 11 months ago
- The method and files used to generate Sysmon event logs, push them to a remote Splunk, and ingest/normalize the data for analysis.☆10Sep 28, 2020Updated 5 years ago
- HoneyDB Python Module☆14Feb 6, 2024Updated 2 years ago
- Self-hosting binary instrumentation framework for security research☆12Apr 10, 2023Updated 2 years ago
- Software Modules and Examples for the PiFex☆14Aug 23, 2025Updated 6 months ago
- Multiplayer snake game written at a single weekend☆13Jul 10, 2019Updated 6 years ago
- A Delphi symbol name recovery tool for reverse engineers.☆23Jan 17, 2026Updated last month
- Simple single-digit-nanosecond-overhead tracer☆18Apr 30, 2025Updated 10 months ago
- A python script that automates a C2 Profile build☆48Dec 14, 2025Updated 2 months ago
- The Zonemaster GUI - part of the Zonemaster project☆17Feb 9, 2026Updated 2 weeks ago
- WinDbg Symbols Caching Proxy.☆17Updated this week
- Platform Certificate Validation Tool - TPM 2.0☆11Dec 9, 2018Updated 7 years ago
- Python client library for the ClamAV antivirus.☆12May 15, 2025Updated 9 months ago
- Bulk scanning of Hosts and IPs using the Shodan API☆10Apr 26, 2022Updated 3 years ago