Save toil in security operations with: Detection & Intelligence Analysis for New Alerts (D.I.A.N.A. )
☆223Sep 4, 2024Updated last year
Alternatives and similar repositories for diana
Users that are interested in diana are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Generate datasets of cloud audit logs for common attacks☆236Apr 23, 2026Updated last week
- A community-driven repository for threat hunting ideas, methodologies, and research that serves as a central gathering place for hunters …☆314Updated this week
- Anvilogic Forge☆118Mar 31, 2026Updated last month
- OCSF Schema Validation☆12Dec 13, 2024Updated last year
- AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE…☆1,218Dec 29, 2025Updated 4 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Detection Engineering is a tactical function of a cybersecurity defense program that involves the design, implementation, and operation o…☆1,181Updated this week
- An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and secur…☆175Mar 11, 2026Updated last month
- ☆121May 26, 2025Updated 11 months ago
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆151Sep 21, 2024Updated last year
- Halberd : Multi-Cloud Agentic Attack Tool☆337Apr 8, 2026Updated 3 weeks ago
- An index of publicly available and open-source threat detection rulesets.☆133Apr 17, 2025Updated last year
- Independently deploy customized honeyservices in AWS to trigger alerts on unauthorized access. It utilizes a dedicated CloudTrail for pre…☆51Nov 16, 2024Updated last year
- kubernetes-for-soc aims to fast-track the learning curve for SOC analysts by enabling them to swiftly grasp the essential concepts and kn…☆56Dec 18, 2023Updated 2 years ago
- ✨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The …☆291Feb 5, 2024Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆107Oct 13, 2025Updated 6 months ago
- Rules shared by the community from 100 Days of YARA 2025☆38Jan 2, 2026Updated 4 months ago
- Automating Security Detection Engineering, published by Packt☆68Oct 12, 2024Updated last year
- AWS honey token manager☆90Aug 1, 2024Updated last year
- Detect Tactics, Techniques & Combat Threats☆2,286Updated this week
- Sublime rules for email attack detection, prevention, and threat hunting.☆361Updated this week
- A catalog of services that can be publicly exposed within different cloud providers.☆14Aug 30, 2024Updated last year
- Cloud Commotion intends to cause chaos to simulate security incidents☆148Jun 18, 2024Updated last year
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆87Apr 7, 2026Updated 3 weeks ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Built-in Panther detection rules and policies☆448Updated this week
- TrailAlerts is a AWS-native, serverless cloud-detection tool that lets you define simple rules as code and get rich alerts about events i…☆52Apr 5, 2026Updated 3 weeks ago
- To clean up your AWS AMIs: First, include AMIs by name or tag. Second, exclude AMIs in use, younger than N days, or the newest N images. …☆36Apr 25, 2026Updated last week
- A tool to uncover undocumented APIs from the AWS Console.☆121Mar 16, 2026Updated last month
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- pocket guide for core detection engineering concepts☆31May 8, 2023Updated 2 years ago
- Agentic Workflows Made Simple☆162Mar 12, 2025Updated last year
- Convert cloudtrail data to MITRE ATT&CK Sightings☆82Jul 25, 2022Updated 3 years ago
- A tool that allows you to create vulnerable instrumented local or cloud environments to simulate attacks against and collect the data int…☆2,478Apr 26, 2026Updated last week
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- ☆23Sep 20, 2024Updated last year
- Open source templates you can use to bootstrap your security programs☆901Dec 28, 2025Updated 4 months ago
- A preconfigured Velociraptor triage collector☆76Apr 20, 2026Updated last week
- A flexible threat detection platform that simplifies rule management and deployment using K8s CronJob and Helm, but can also run standalo…☆383Oct 1, 2024Updated last year
- Awesome list of keywords and artifacts for Threat Hunting sessions☆654Aug 4, 2025Updated 8 months ago
- Suzaku (朱雀) is a sigma-based threat hunting and fast forensics timeline generator for cloud logs.☆174Mar 29, 2026Updated last month
- Helm charts for running open source digital forensic tools in Kubernetes☆192Updated this week