☆87Feb 20, 2026Updated 2 weeks ago
Alternatives and similar repositories for ai-runbooks
Users that are interested in ai-runbooks are comparing it to the libraries listed below
Sorting:
- Command line tool to interact with Chronicle's Config Based Normalizer (CBN) APIs.☆32Aug 31, 2023Updated 2 years ago
- A CLI tool for managing Chronicle user workflows☆18Sep 24, 2025Updated 5 months ago
- Automatic detection engineering technical state compliance☆55Jul 7, 2024Updated last year
- 🛡️ SIGMA Detection Engineering Platform A comprehensive AI-powered detection engineering platform for security teams to explore MITRE AT…☆45Jun 28, 2025Updated 8 months ago
- ☆62Feb 28, 2026Updated last week
- Enhance GitHub security by revoking unused credentials automatically with TenTwentyOne's GitHub Action☆17Apr 4, 2025Updated 11 months ago
- ☆45Updated this week
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆104Oct 13, 2025Updated 4 months ago
- IMDSPOOF is a cyber deception tool that spoofs the AWS IMDS service to return HoneyTokens that can be alerted on.☆106Nov 24, 2023Updated 2 years ago
- Palo Alto Networks AI Runtime Security Model Context Protocol (MCP) Relay Server☆31Jan 27, 2026Updated last month
- Improved auto-away monitoring for Nest Thermostats☆15Oct 12, 2014Updated 11 years ago
- ☆13Nov 24, 2021Updated 4 years ago
- Generate HID attack strings for Kali Nethunter☆12Mar 20, 2015Updated 10 years ago
- PowerShell-based Windows Server Security Audit Engine by Cyb3rint3l Labs. Measures alignment with the NIS2 directive and maps findings to…☆41Feb 1, 2026Updated last month
- A repository with data about APTs☆13Nov 24, 2022Updated 3 years ago
- This Guidance demonstrates how to effectively orchestrate multiple specialized AI agents to solve complex customer support challenges thr…☆25Jan 8, 2026Updated 2 months ago
- ☆13Sep 15, 2024Updated last year
- [ICLR 2025 SCI-FM Workshop] Lemur: Log Parsing with Entropy Sampling and Chain-of-Thought Merging☆13Mar 27, 2025Updated 11 months ago
- A comprehensive framework and assessment toolkit for measuring and improving Cloud Native security maturity across 8 critical business fu…☆10Jun 24, 2025Updated 8 months ago
- All about ransomware notes and extension files.☆14Aug 26, 2023Updated 2 years ago
- The Developer's Guide to AI - From Prompts to Agents☆28Feb 27, 2026Updated last week
- Parsing Module of Microsoft SQL Server Transaction log☆11May 12, 2023Updated 2 years ago
- Packages Repository☆13Oct 25, 2015Updated 10 years ago
- ☆42Dec 13, 2020Updated 5 years ago
- Sensor Mappings to ATT&CK is a collection of resources to assist cyber defenders with understanding which sensors and events can help det…☆51Jun 21, 2025Updated 8 months ago
- The backend server handling API requests and task management☆56Mar 3, 2026Updated last week
- Demo for vulnerable Nodejs project☆12Jul 6, 2024Updated last year
- Tool for obtaining information about PPL processes☆16Feb 12, 2024Updated 2 years ago
- Public Chronicle Detection Rules☆12Apr 25, 2023Updated 2 years ago
- Adds macros for vim mode plus☆12Dec 16, 2019Updated 6 years ago
- systemd units for sharing usb devices by usb/ip☆14Mar 3, 2024Updated 2 years ago
- A Discord bot for natural, realtime voice conversations powered by ElevenLabs Agent.☆10Sep 17, 2025Updated 5 months ago
- DFIR notebooks GCIH Gold project, paper☆12Apr 30, 2015Updated 10 years ago
- OPA policies for securing Docker API☆11Aug 14, 2023Updated 2 years ago
- ☆10Jul 16, 2023Updated 2 years ago
- Store ZAP reports historically and compare current ZAP results against the most recent for changes in alerts.☆12Mar 3, 2026Updated last week
- Collection of Semgrep rules for security analysis☆10Mar 30, 2024Updated last year
- Core module for Forgiva Enterprise connecting Forgiva Server to Forgiva Webclient.☆13Mar 28, 2022Updated 3 years ago
- GHARF is an efficient support framework for Red Team exercises that applies the concept of CI/CD☆37Jul 14, 2025Updated 7 months ago