A repo for security analytics & threat hunting resources
☆21Sep 25, 2018Updated 7 years ago
Alternatives and similar repositories for awesome-security-analytics
Users that are interested in awesome-security-analytics are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- You can access the sigma rules to detect malicious activities. It is organized by Mitre Att&ck categories.☆13Feb 7, 2022Updated 4 years ago
- OpenDXL Broker is an open source version of a Data Exchange Layer (DXL) broker☆14Feb 11, 2024Updated 2 years ago
- Subdomain Finder Application has 2 tools and 4 web services. With these we are finding the subdomains of the domain.☆11Dec 16, 2016Updated 9 years ago
- Napkin is a simple tool to produce statistical analysis of a text☆12Feb 25, 2024Updated 2 years ago
- A Django package that force authentication requirement by default on every single endpoint.☆12Sep 8, 2019Updated 6 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Ossec cookbook for Chef, with secure & automated key management☆21Jun 13, 2013Updated 12 years ago
- Windows Thingies... but in Rust☆23Nov 12, 2022Updated 3 years ago
- Validates yara rules and tries to repair the broken ones.☆41Sep 5, 2020Updated 5 years ago
- CyCAT.org taxonomies☆15May 22, 2021Updated 4 years ago
- Personal notes and lab results pertaining to the text "Practical Malware Analysis" by Michael Sikorski and Andrew Honiq.☆12Oct 28, 2017Updated 8 years ago
- ☆18Feb 16, 2024Updated 2 years ago
- Converts C programs that only use syscalls to 64 bit assembly file.☆12Mar 7, 2021Updated 5 years ago
- Cyber Security Researcher Mert SARICA's Python codes (https://www.hack4career.com)☆85Aug 31, 2025Updated 8 months ago
- My config for Home Assistant running on Linux 18.04 LTS in Docker.☆11Nov 5, 2019Updated 6 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- An Inofficial Sysmon Version History (Change Log)☆33Oct 25, 2020Updated 5 years ago
- Volatility plugin to search for all Autostart Extensibility Points (AESPs)☆10May 16, 2024Updated last year
- Find accounts using common and default passwords in Active Directory.☆70Sep 19, 2019Updated 6 years ago
- Scapy ile ilgili bir takım alıştırmalar ve bilgiler içerir☆29May 2, 2016Updated 10 years ago
- The Intelligent Process Lifecycle of Active Cyber Defenders☆34Jan 1, 2023Updated 3 years ago
- Security information and event management, masters's diploma☆10Aug 3, 2015Updated 10 years ago
- This repo contain Android malware samples and analysis☆13Apr 3, 2021Updated 5 years ago
- Scan extracted file from Zeek with Yara rules and get statistical analysis for matching files. Optionally, simulate matching malicious fi…☆15Dec 18, 2023Updated 2 years ago
- Search engine scraper tool with BASH script.☆83Jan 28, 2020Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Writeup and scripts for the 2021 malwarebytes crackme☆11Nov 9, 2021Updated 4 years ago
- Snort_rules detection bad actors.☆29Aug 18, 2024Updated last year
- Welcome to the NCC Group Threat Intelligence Alert repo, here you will find the alerts which we have raised to our customers regarding in…☆25Feb 6, 2023Updated 3 years ago
- Windows Privilege Escalation (Modified RottePotato)☆13Jun 5, 2018Updated 7 years ago
- IDA python plugin to scan binary with Yara rules☆181Jan 30, 2024Updated 2 years ago
- Reconnaisance Tool☆12Jun 4, 2020Updated 5 years ago
- A CLI tool that converts DER or PEM encoded ASN.1 structures into an equivalent textual description compatible with OpenSSL's ASN1_genera…☆25Jan 21, 2026Updated 3 months ago
- Assembly API block that uses CRC32 for resolving Windows API function addresses☆18May 19, 2023Updated 2 years ago
- Open source training materials for law-enforcement and organisations interested in DFIR.☆63May 30, 2025Updated 11 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- A Mozilla Firefox extension which allows quick access to your google-dorking result☆19Jun 18, 2020Updated 5 years ago
- Limier est un petit outil en CLI permettant de trouver un flux RSS quand il est planqué sur un site.☆19Aug 6, 2023Updated 2 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆20Sep 11, 2023Updated 2 years ago
- Brute-force script for finding azorult XOR key.☆14May 22, 2019Updated 6 years ago
- Analysis of file (doc, pdf, exe, ...) in deep (emmbedded file(s)) with clamscan and yara rules☆51Sep 6, 2023Updated 2 years ago
- Semantic strings based on tree-sitter☆17Feb 19, 2025Updated last year
- Meetuplardan arta kalanlar☆41Aug 18, 2025Updated 8 months ago