google / facadeLinks
☆138Updated 5 months ago
Alternatives and similar repositories for facade
Users that are interested in facade are comparing it to the libraries listed below
Sorting:
- Lightweight macOS detection agent built on Santa’s Endpoint Security telemetry.☆102Updated 2 months ago
- The Event Maturity Matrix (EMM) is a comprehensive framework that provides clarity regarding the capabilities and nuances of SaaS audit l…☆30Updated 7 months ago
- A zero dependency and customizable Python library for scanning Windows and Linux process memory.☆66Updated 2 years ago
- ☆74Updated 4 months ago
- A framework and taxonomy for identifying, classifying, and reasoning about detection logic bugs in SIEM, EDR, and XDR rules, with concret…☆23Updated this week
- ☆41Updated last year
- ☆18Updated this week
- Repository that contains a set of purposefully erroneous Yara rules.☆61Updated 6 months ago
- ☆51Updated last month
- ☆14Updated 3 weeks ago
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆60Updated 2 months ago
- A PoC to Simulate Ransomware Attack on AWS Environment☆32Updated last year
- Automated vulnerability discovery and annotation☆68Updated last year
- Examine Chrome extensions for security issues☆93Updated 2 months ago
- Framework for Monitoring File Ingestion Source for Yara Matches☆50Updated 10 months ago
- Living off the False Positive!☆41Updated last year
- An LLM and OCR based Indicator of Compromise Extraction Tool☆38Updated last year
- A little tool to filter the stranger strings from a binary so you can analyze the good ones☆52Updated 4 months ago
- TTPMapper is an AI-driven threat intelligence parser that converts unstructured reports whether from web URLs or PDF files into structure…☆49Updated 7 months ago
- AI-powered Windows Event Log analyzer that learns from your feedback. Uses Claude AI with RAG to detect suspicious activity, improve ac…☆31Updated last month
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆40Updated 2 years ago
- Lightweight Python-Based Malware Analysis Pipeline☆37Updated last month
- ☆23Updated last year
- ForgeArmory provides TTPs that can be used with the TTPForge (https://github.com/facebookincubator/ttpforge).☆119Updated last month
- Rules shared by the community from 100 Days of YARA 2025☆38Updated last month
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆79Updated 2 years ago
- A comprehensive GenAI protection system designed to protect against malicious prompts, injection attacks, and harmful content. System inc…☆95Updated 3 months ago
- Attack Tool Timing and Reporting - Structured Attack Logging Format☆22Updated 3 years ago
- Dont Gamble with Risk☆14Updated last year
- Assortment of scripts and tools for our Blackhat EU 2024 talk☆104Updated 11 months ago