☆33Mar 24, 2026Updated last month
Alternatives and similar repositories for echothreat
Users that are interested in echothreat are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Cyber Threat Intelligence☆79Dec 7, 2025Updated 4 months ago
- Azure Activity Log Axe is a continually developing tool that simplifies the transactional log format provided by Microsoft. The tool leve…☆35Sep 6, 2024Updated last year
- Draugnet is a lightweight, open-source tool for anonymous cyber threat reporting. Built for the MISP ecosystem, it lets users submit and …☆20Mar 24, 2026Updated last month
- A preconfigured Velociraptor triage collector☆76Apr 20, 2026Updated 2 weeks ago
- The Measure, Maximize, and Mature Threat-Informed Defense (M3TID) project defines what Threat-Informed Defense (TID) is and the key activ…☆17Jun 25, 2025Updated 10 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Splunk custom alert action for Atlassian JIRA☆19Oct 9, 2018Updated 7 years ago
- TCP over DNS tunnel b[l]ind written in go.☆16Dec 22, 2024Updated last year
- ☆11Jun 12, 2023Updated 2 years ago
- ☆31Dec 11, 2025Updated 4 months ago
- Improves vulnerability prioritization by enhancing CVSS scores with exploit intelligence. Combines data from CISA KEV, EPSS, Metasploit, …☆14Updated this week
- Microsoft Office365 Protection Center Audit Log Parser☆27Jul 17, 2023Updated 2 years ago
- A tool to display Windows Event logs as they happen.☆14Sep 19, 2023Updated 2 years ago
- Ansible integration for Secrets Manager☆14Apr 15, 2026Updated 2 weeks ago
- ☆42Apr 18, 2023Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Code for "Can We Fix Social Media? Testing Prosocial Interventions using Generative Social Simulation"☆27Nov 21, 2025Updated 5 months ago
- ☆12Mar 27, 2024Updated 2 years ago
- public assets for ironcat emulation software ;)☆14Sep 8, 2023Updated 2 years ago
- ultimate-cybersecurity-lab☆24Mar 19, 2024Updated 2 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns by leveraging Windows Events and Sys…☆12Apr 13, 2017Updated 9 years ago
- Cowrie SSH/Telnet Honeypot http://cowrie.readthedocs.io☆13Jun 25, 2020Updated 5 years ago
- Mapping your datasources and detections to the MITRE ATT&CK Navigator framework.☆61May 25, 2020Updated 5 years ago
- Collection of scripts and tools that I created to aid in my testing.☆14Mar 2, 2022Updated 4 years ago
- Examples of various Entra ID scenarios in Terraform☆21Sep 24, 2024Updated last year
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A starter pack of resources to help you get started in Detection Engineering.☆186Jan 17, 2026Updated 3 months ago
- .Net Assembly loader for the GMSAPasswordReader☆20Feb 15, 2023Updated 3 years ago
- Collection of operational focused osquery dashboards.☆10Jan 20, 2021Updated 5 years ago
- Jupyter Univere is a search engine for all infosec jupyter notebooks☆37Mar 24, 2025Updated last year
- Configuration of LogStash (and Filebeat) for Analytics treatment.☆17Jun 25, 2018Updated 7 years ago
- Command-line tool for discovering SaaS platforms a company uses via DNS enumeration☆40Jul 23, 2025Updated 9 months ago
- Entra ID (Azure AD) error codes as JSON☆18Oct 30, 2025Updated 6 months ago
- MCP Server for Ghidra. Exposes tools to be used by AI-powered reverse engineers.☆17Mar 29, 2025Updated last year
- Pull Hashes Decryption From Online Sources Using Python☆15Jun 25, 2024Updated last year
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Learn how to get more out of publicly available threat reports to help improve the security posture of your organization! TLP: White Thre…☆15Jun 5, 2023Updated 2 years ago
- ☆20Nov 13, 2025Updated 5 months ago
- ☆23Jan 29, 2024Updated 2 years ago
- 🛡️ SIGMA Detection Engineering Platform A comprehensive AI-powered detection engineering platform for security teams to explore MITRE AT…☆45Jun 28, 2025Updated 10 months ago
- ☆14Jan 2, 2025Updated last year
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆14Jul 18, 2018Updated 7 years ago
- A cutting-edge PHP 7.4+ webshell designed for advanced penetration testing.☆26Feb 5, 2026Updated 2 months ago