An index of publicly available and open-source threat detection rulesets.
☆135Apr 17, 2025Updated last year
Alternatives and similar repositories for Rulehound
Users that are interested in Rulehound are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An OpenAI API Compatible Honeypot Gateway☆22Mar 17, 2025Updated last year
- Convert Sigma rules to SIEM queries, directly in your browser.☆116Updated this week
- Web Server Vulnerability Scanning Tool☆37Mar 11, 2025Updated last year
- PoC shadow SaaS and insecure credential detection system using a browser extension.☆44May 8, 2026Updated 2 weeks ago
- Fast and easy to use CLI-based file encryption program 📦☆13Oct 12, 2025Updated 7 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A public collection of detections designed to detect threats associated with the Okta WIC Platform.☆25May 12, 2026Updated last week
- AutoPwnKey is a red teaming framework and testing tool using AutoHotKey (AHK), which at the time of creation proves to be quite evasive. …☆112Jul 21, 2025Updated 10 months ago
- The Eventlog Compendium is the go-to resource for understanding Windows Event Logs.☆54Apr 22, 2025Updated last year
- pocket guide for core detection engineering concepts☆31May 8, 2023Updated 3 years ago
- A preconfigured Velociraptor triage collector☆77May 4, 2026Updated 2 weeks ago
- Ludus roles to deploy ASR rules and MDI auditing settings☆24Aug 5, 2025Updated 9 months ago
- A catalog of services that can be publicly exposed within different cloud providers.☆14Aug 30, 2024Updated last year
- ☆54Apr 27, 2026Updated 3 weeks ago
- ☆13Updated this week
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Quick ESXi Log Parser☆31Oct 20, 2025Updated 7 months ago
- Save toil in security operations with: Detection & Intelligence Analysis for New Alerts (D.I.A.N.A. )☆223Sep 4, 2024Updated last year
- Hunt for SQLite files used by various applications☆31Mar 1, 2026Updated 2 months ago
- CRADLE is a collaborative platform for Cyber Threat Intelligence analysts. It streamlines threat investigations with integrated note-taki…☆344Updated this week
- Suzaku (朱雀) is a sigma-based threat hunting and fast forensics timeline generator for cloud logs.☆175May 3, 2026Updated 2 weeks ago
- NOVA: The Prompt Pattern Matching☆136May 16, 2026Updated last week
- Mapping of open-source detection rules and atomic tests.☆211Feb 16, 2026Updated 3 months ago
- Security tool against dependency typosquatting attacks☆56Updated this week
- ☆165Mar 20, 2026Updated 2 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆42May 7, 2023Updated 3 years ago
- Substation is a toolkit for routing, normalizing, and enriching security event and audit logs.☆400Jan 20, 2026Updated 4 months ago
- 🌑 EclipseRecon is a personal project developed during my cybersecurity learning journey 🛡️. It helps practice web reconnaissance 🌐 by …☆30Nov 26, 2025Updated 5 months ago
- 🖥️ Windows 🚀 A Windows tool for emergency privacy: instantly deletes sensitive data and active logins to protect my information during …☆56Apr 26, 2026Updated 3 weeks ago
- 🐻❄️ 🏹 Threat hunting with Polars and flaws.cloud AWS CloudTrail datasets.☆14May 22, 2024Updated 2 years ago
- Generate datasets of cloud audit logs for common attacks☆237May 7, 2026Updated 2 weeks ago
- Generates a detailed CSV file containing Sigma Rules statistics for each service or category, and each level, offering a holistic view of…☆10Dec 22, 2023Updated 2 years ago
- Listener that spawns a new tmux window for each incoming reverse shell + Supports listening on many ports☆61Jul 13, 2025Updated 10 months ago
- Feed it a number. Your cloned voice does the social engineering, while you sip your coffee. A ghost that talks on the phone for you.☆113May 30, 2025Updated 11 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- SimpleCrypt is a powerful command-line tool designed for securely encrypting and decrypting files and directories using AES-256 encryptio…☆20Mar 22, 2026Updated 2 months ago
- A lightweight PowerShell tool for assessing the security posture of Microsoft Entra ID environments. It helps identify privileged object…☆435Updated this week
- Nakamoto is a 2 layer encryption tool to protect your data and your cyptocurrency☆16May 2, 2026Updated 3 weeks ago
- BlueSky OSINT Tool☆15Dec 10, 2024Updated last year
- Terms of Use Conditional Access M365 Evilginx Phishlet☆46Jun 23, 2025Updated 11 months ago
- A proof of concept AMSI & ETW bypass using trampolines for hooking and modifying execution flow☆19Jun 26, 2025Updated 10 months ago
- Addon for BHCE☆57Apr 1, 2025Updated last year