caliskanfurkan / awesome-security-analyticsView external linksLinks
A repo for security analytics & threat hunting resources
☆21Sep 25, 2018Updated 7 years ago
Alternatives and similar repositories for awesome-security-analytics
Users that are interested in awesome-security-analytics are comparing it to the libraries listed below
Sorting:
- Ossec cookbook for Chef, with secure & automated key management☆21Jun 13, 2013Updated 12 years ago
- My collection of awesome resources, tools, and other shiny things for cyber security stuffs.☆17Aug 31, 2018Updated 7 years ago
- You can access the sigma rules to detect malicious activities. It is organized by Mitre Att&ck categories.☆13Feb 7, 2022Updated 4 years ago
- ☆17Feb 16, 2024Updated last year
- OpenDXL Broker is an open source version of a Data Exchange Layer (DXL) broker☆14Feb 11, 2024Updated 2 years ago
- A python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat groups.☆67Nov 27, 2018Updated 7 years ago
- CIRCL system forensic tools or a jumble of tools to support forensic☆41Jan 20, 2023Updated 3 years ago
- Validates yara rules and tries to repair the broken ones.☆41Sep 5, 2020Updated 5 years ago
- Welcome to the NCC Group Threat Intelligence Alert repo, here you will find the alerts which we have raised to our customers regarding in…☆25Feb 6, 2023Updated 3 years ago
- Picus Labs☆44Mar 11, 2021Updated 4 years ago
- Snort_rules detection bad actors.☆29Aug 18, 2024Updated last year
- IDA python plugin to scan binary with Yara rules☆180Jan 30, 2024Updated 2 years ago
- The Intelligent Process Lifecycle of Active Cyber Defenders☆33Jan 1, 2023Updated 3 years ago
- A defense tool - detect web shells in local directories via md5sum☆32Jul 18, 2019Updated 6 years ago
- misp-cloud - Cloud-ready images of MISP☆74Aug 24, 2022Updated 3 years ago
- Community content for LogRhythm Axon. Includes Dashboards, searches, analytics rules, processing policies and more.☆10Jul 26, 2024Updated last year
- Security information and event management, masters's diploma☆10Aug 3, 2015Updated 10 years ago
- Command-line Interface for Binar.ly☆39Jan 13, 2017Updated 9 years ago
- TLS scanning component of OWASP PurpleTeam☆11Feb 8, 2023Updated 3 years ago
- Installation tools for CircleCI Server - Static☆10Jan 14, 2023Updated 3 years ago
- Azure Deployment Templates for Mandiant Managed Huning☆12Jun 1, 2023Updated 2 years ago
- a python script that automates recon flow for a given target domain.☆10Apr 21, 2022Updated 3 years ago
- ☆37Dec 17, 2020Updated 5 years ago
- An Inofficial Sysmon Version History (Change Log)☆33Oct 25, 2020Updated 5 years ago
- Repository with selected IOCs and YARA rules for threat hunting.☆35May 21, 2025Updated 8 months ago
- Search engine scraper tool with BASH script.☆83Jan 28, 2020Updated 6 years ago
- It's a tool to manage vulnerables packages in your *nix server, in a centralized way☆30Dec 15, 2020Updated 5 years ago
- OSINT tool to evaluate the trustworthiness of a company☆41Dec 7, 2019Updated 6 years ago
- Linux Automatic ARP (TCP / UDP / ICMP) Firewall☆83Oct 24, 2019Updated 6 years ago
- Resources for the Kubernetes Fundamentals course.☆13Jan 14, 2025Updated last year
- ☆12Sep 15, 2025Updated 5 months ago
- Project that creates a Kubernetes environment in Azure (AKS) and protects it with CloudGuard CSPM / Workload and Appsec technologies☆10Jun 12, 2023Updated 2 years ago
- PowerShellUtilities provides various utility commandlets.☆51Aug 3, 2020Updated 5 years ago
- Threat Network Detection in Online Social Networks☆10Jan 20, 2017Updated 9 years ago
- Code samples of querying the API services of Whois XML Api.☆12Dec 14, 2023Updated 2 years ago
- This is a repository from Adam Swan and I's presentation on Windows Logs Zero 2 Hero.☆22Jan 30, 2018Updated 8 years ago
- ☆12Feb 16, 2017Updated 8 years ago
- A human readable log format for Python☆13Nov 3, 2017Updated 8 years ago
- Setup a RaspberryPi as a responder-in-a-box dropbox for Pentesting☆12Sep 22, 2017Updated 8 years ago