☆32Aug 16, 2025Updated 6 months ago
Alternatives and similar repositories for echothreat
Users that are interested in echothreat are comparing it to the libraries listed below
Sorting:
- Cyber Threat Intelligence☆78Dec 7, 2025Updated 2 months ago
- Azure Activity Log Axe is a continually developing tool that simplifies the transactional log format provided by Microsoft. The tool leve…☆35Sep 6, 2024Updated last year
- public assets for ironcat emulation software ;)☆14Sep 8, 2023Updated 2 years ago
- This JavaScript CLI "undeletes' packages that have been removed from the NPM registry☆29Dec 18, 2025Updated 2 months ago
- This is a PoC using native windows API directx, to hide and decrypt shellcode via compute shader☆10May 3, 2025Updated 10 months ago
- Code Repository for Linux Troubleshooting Course with Real Life Examples, published by Packt☆12Jul 8, 2025Updated 7 months ago
- JournalCraft for Obsidian☆29Sep 28, 2025Updated 5 months ago
- ☆43Apr 18, 2023Updated 2 years ago
- A collection of my favourite workflows☆10Dec 31, 2024Updated last year
- The Hugr service☆27Feb 12, 2026Updated 2 weeks ago
- A python SDK for accessing the Keymate-API☆13Jun 25, 2024Updated last year
- Opinionated Go Project Template☆13Updated this week
- CQL Hub is an open repository of detection and hunting queries for CrowdStrike NextGen SIEM and Falcon LogScale. All queries stored here …☆40Updated this week
- Draugnet is a lightweight, open-source tool for anonymous cyber threat reporting. Built for the MISP ecosystem, it lets users submit and …☆20Updated this week
- ☆15Feb 25, 2026Updated last week
- Installs ADDS and configures a vulnerable domain via a powershell script☆12Jul 13, 2023Updated 2 years ago
- ☆28Feb 8, 2026Updated 3 weeks ago
- A proxy for converting the OpenAI API protocol to the Google Gemini Pro protocol. Now with Embeddings support and 100% less model mapping…☆11Aug 8, 2024Updated last year
- An LLM leaderboard for stateful agents☆20Oct 16, 2025Updated 4 months ago
- Sample demo to show case Pulumi Automation API in a nextjs project☆12Apr 21, 2022Updated 3 years ago
- ☆13Dec 15, 2025Updated 2 months ago
- ☆11Jun 12, 2023Updated 2 years ago
- CloudWatch Log Redirector☆15Feb 3, 2026Updated last month
- Command-line interface for any Model Context Protocol (MCP) server.☆35Oct 1, 2025Updated 5 months ago
- Rust / C Cross Compilation with Bazel☆12Jan 7, 2025Updated last year
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns by leveraging Windows Events and Sys…☆12Apr 13, 2017Updated 8 years ago
- A Nix language mode for CodeMirror 6☆17Oct 7, 2023Updated 2 years ago
- AI-driven PowerShell prompts for encryption, decryption, hashing, and key management. Secure your data with practical cryptographic solut…☆12Mar 4, 2025Updated last year
- Neuro-Symbolic Agentic Protocol☆38Dec 3, 2025Updated 3 months ago
- Harness the security superpowers of your cloud asset inventory☆11Sep 22, 2024Updated last year
- A tool to display Windows Event logs as they happen.☆14Sep 19, 2023Updated 2 years ago
- [ICLR 2026] "When AI Agents Collude Online: Financial Fraud Risks by Collaborative LLM Agents on Social Platforms"☆26Feb 3, 2026Updated last month
- Agent PR Replay takes merged PRs from any repository, reverse-engineers the task prompt, runs Claude Code against it, and compares what t…☆30Jan 1, 2026Updated 2 months ago
- Collection of operational focused osquery dashboards.☆11Jan 20, 2021Updated 5 years ago
- WIP☆14Jan 15, 2024Updated 2 years ago
- A starter pack of resources to help you get started in Detection Engineering.☆182Jan 17, 2026Updated last month
- Examples of various Entra ID scenarios in Terraform☆17Sep 24, 2024Updated last year
- Collection of scripts and tools that I created to aid in my testing.☆14Mar 2, 2022Updated 4 years ago
- Learn how to get more out of publicly available threat reports to help improve the security posture of your organization! TLP: White Thre…☆15Jun 5, 2023Updated 2 years ago