β65Mar 24, 2026Updated this week
Alternatives and similar repositories for adk_runbooks
Users that are interested in adk_runbooks are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- π‘οΈ SIGMA Detection Engineering Platform A comprehensive AI-powered detection engineering platform for security teams to explore MITRE ATβ¦β45Jun 28, 2025Updated 9 months ago
- Curated list of Open Source project focused on LLM securityβ72Dec 23, 2025Updated 3 months ago
- π€ A GitHub action that leverages fabric patterns through an agent-based approachβ34Jan 4, 2025Updated last year
- β38Nov 12, 2024Updated last year
- Continuous Threat Exposure Management Maturity Model (CTEMMM)β29Feb 6, 2026Updated last month
- Managed Kubernetes at scale on DigitalOcean β’ AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A 30-day hands-on SOC Analyst project simulating real-world cyber attacks using ELK Stack, Mythic C2, osTicket & Elastic Defend. Covers tβ¦β41Jun 10, 2025Updated 9 months ago
- Automated detection rule analysis utilityβ28Sep 22, 2022Updated 3 years ago
- SATO is a PowerShell tool focuses on providing flexible, multi-grant type support for obtaining, managing, and analyzing Azure tokens.β22Nov 24, 2025Updated 4 months ago
- Malware detonation platform Polygon integrationβ10Aug 1, 2023Updated 2 years ago
- β120May 26, 2025Updated 10 months ago
- [ICLR 2025 SCI-FM Workshop] Lemur: Log Parsing with Entropy Sampling and Chain-of-Thought Mergingβ14Mar 27, 2025Updated last year
- Quick tool for using Hybrid Analysis API on command line..β17Dec 20, 2017Updated 8 years ago
- A pySigma wrapper and langchain toolkit for automatic rule creation/translationβ92Nov 3, 2025Updated 4 months ago
- β10Dec 24, 2022Updated 3 years ago
- End-to-end encrypted email - Proton Mail β’ AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Abusing Remote Windows SMB Shares for Fun and Pen Testingβ15May 23, 2023Updated 2 years ago
- Fleak ZephFlow core engineβ54Updated this week
- A Rack middleware to support "the proper way" to version a RESTful APIβ30Jun 9, 2010Updated 15 years ago
- A framework and taxonomy for identifying, classifying, and reasoning about detection logic bugs in SIEM, EDR, and XDR rules, with concretβ¦β48Mar 5, 2026Updated 3 weeks ago
- Perplexity Lite using Langgraph, Tavily, and GPT-4.β25May 1, 2024Updated last year
- AI featured threat modeling and security review projectβ17Nov 17, 2024Updated last year
- General Contentβ27Dec 23, 2025Updated 3 months ago
- A framework for TinTin++ using tmuxβ12Jul 10, 2016Updated 9 years ago
- A comprehensive GenAI protection system designed to protect against malicious prompts, injection attacks, and harmful content. System incβ¦β98Oct 15, 2025Updated 5 months ago
- Managed hosting for WordPress and PHP on Cloudways β’ AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A GitHub workflow to identify employees that have leaked your organization's codeβ13May 23, 2023Updated 2 years ago
- β10Dec 30, 2020Updated 5 years ago
- A network logging tool that logs per process activitiesβ32Jun 13, 2023Updated 2 years ago
- A starter pack of resources to help you get started in Detection Engineering.β184Jan 17, 2026Updated 2 months ago
- β90Mar 19, 2026Updated last week
- Collection of my test rules and Submissions to Emerging-Sigsβ11Apr 22, 2016Updated 9 years ago
- Integration between SIEMs and TAXII servicesβ10Mar 2, 2023Updated 3 years ago
- All the principles of the AI modular structure that generates malicious code fragments sold on the dark webβ69Apr 30, 2024Updated last year
- Objectify-s3 is a tool that recursively checks AWS S3 buckets and objects for misconfigured permissions.β14Mar 1, 2026Updated 3 weeks ago
- NordVPN Threat Protection Proβ’ β’ AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- A collection of content for blue team professionals, designed to support both reactive and proactive cybersecurity measures of every aspeβ¦β33Oct 24, 2025Updated 5 months ago
- β15Mar 12, 2025Updated last year
- Summit Route End Point Protection - Client codeβ16Apr 10, 2016Updated 9 years ago
- Shared lists of problem domains people may want to block with hosts filesβ16Mar 3, 2025Updated last year
- Tools to automate and/or expedite response.β116Jul 5, 2024Updated last year
- Site for IWS book contentβ17Oct 28, 2018Updated 7 years ago
- parse strace logβ12Oct 16, 2019Updated 6 years ago