Production-ready detection & response queries for osquery
☆605Apr 22, 2026Updated last month
Alternatives and similar repositories for osquery-defense-kit
Users that are interested in osquery-defense-kit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Automated testing, generation & manipulation of #osquery packs☆75Apr 10, 2026Updated last month
- Threat Hunting & Incident Investigation with Osquery☆219Mar 30, 2022Updated 4 years ago
- Mapping the MITRE ATT&CK Matrix with Osquery☆811May 11, 2023Updated 3 years ago
- Remotely collect linux live forensics artifacts.☆14Jul 8, 2022Updated 3 years ago
- Fast and efficient osquery management☆501May 16, 2026Updated last week
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Transform Linux Audit logs for SIEM usage☆829Updated this week
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.☆339May 7, 2026Updated 2 weeks ago
- A repository for using osquery for incident detection and response☆894Sep 8, 2025Updated 8 months ago
- Aftermath is a free macOS IR framework☆582Sep 25, 2025Updated 7 months ago
- Open source security data lake for threat hunting, detection & response, and cybersecurity analytics at petabyte scale on AWS☆1,672Jan 8, 2025Updated last year
- Cisco Orbital - Osquery queries by Talos☆136Aug 23, 2024Updated last year
- Linux #rootkit and #malware revealer☆31Aug 1, 2024Updated last year
- ☆34Aug 8, 2023Updated 2 years ago
- Granular, Actionable Adversary Emulation for the Cloud☆2,319May 13, 2026Updated last week
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of par…☆254Nov 18, 2024Updated last year
- Detection Engineering is a tactical function of a cybersecurity defense program that involves the design, implementation, and operation o…☆1,195Apr 30, 2026Updated 3 weeks ago
- Adversary emulation for EDR/SIEM testing (macOS/Linux)☆54May 12, 2026Updated last week
- Elastic Security detection content for Endpoint☆1,433Updated this week
- Detect Tactics, Techniques & Combat Threats☆2,292Apr 29, 2026Updated 3 weeks ago
- #supply #chain #attack #detection☆655Updated this week
- This is a collection of threat detection rules / rules engines that I have come across.☆300May 5, 2024Updated 2 years ago
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆154Apr 25, 2022Updated 4 years ago
- ☆2,585Updated this week
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Sysmon event simulation utility which can be used to simulate the attacks to generate the Sysmon Event logs for testing the EDR detection…☆866Jan 20, 2022Updated 4 years ago
- Built-in Panther detection rules and policies☆452May 15, 2026Updated last week
- Set of EVTX samples (>270) mapped to MITRE ATT&CK tactic and techniques to measure your SIEM coverage or developed new use cases.☆629May 9, 2026Updated 2 weeks ago
- ☆88Mar 7, 2025Updated last year
- ☆194May 17, 2026Updated last week
- Automating situational awareness for cloud penetration tests.☆2,382Apr 21, 2026Updated last month
- A cross platform parser for Apple UnifiedLogs!☆352May 7, 2026Updated 2 weeks ago
- BlueHound - pinpoint the security issues that actually matter☆765Jul 12, 2023Updated 2 years ago
- Hundred Days of Yara Challenge☆12Jun 21, 2022Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A curated list of resources about detecting threats and defending Kubernetes systems.☆407Sep 2, 2023Updated 2 years ago
- A knowledge base of actionable Incident Response techniques☆665May 31, 2022Updated 3 years ago
- ☆553Dec 4, 2023Updated 2 years ago
- A standard for reducing log volume without sacrificing analytical capability☆216Feb 21, 2025Updated last year
- SIEGMA - Transform Sigma rules into SIEM consumables☆159Mar 10, 2025Updated last year
- Re-play Security Events☆1,753Mar 20, 2024Updated 2 years ago
- DFIQ is a collection of investigative questions and the approaches for answering them☆309Mar 10, 2026Updated 2 months ago