An index of publicly available and open-source threat detection rulesets.
☆130Apr 17, 2025Updated 11 months ago
Alternatives and similar repositories for Rulehound
Users that are interested in Rulehound are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An OpenAI API Compatible Honeypot Gateway☆17Mar 17, 2025Updated last year
- Convert Sigma rules to SIEM queries, directly in your browser.☆113Jan 24, 2026Updated last month
- Web Server Vulnerability Scanning Tool☆36Mar 11, 2025Updated last year
- PoC shadow SaaS and insecure credential detection system using a browser extension.☆42Feb 8, 2026Updated last month
- Fast and easy to use CLI-based file encryption program 📦☆13Oct 12, 2025Updated 5 months ago
- AutoPwnKey is a red teaming framework and testing tool using AutoHotKey (AHK), which at the time of creation proves to be quite evasive. …☆110Jul 21, 2025Updated 8 months ago
- A public collection of detections designed to detect threats associated with the Okta WIC Platform.☆23Mar 11, 2026Updated last week
- The Eventlog Compendium is the go-to resource for understanding Windows Event Logs.☆54Apr 22, 2025Updated 11 months ago
- pocket guide for core detection engineering concepts☆31May 8, 2023Updated 2 years ago
- A preconfigured Velociraptor triage collector☆76Mar 2, 2026Updated 3 weeks ago
- Ludus roles to deploy ASR rules and MDI auditing settings☆24Aug 5, 2025Updated 7 months ago
- A catalog of services that can be publicly exposed within different cloud providers.☆14Aug 30, 2024Updated last year
- ☆52Dec 20, 2025Updated 3 months ago
- ☆11Dec 9, 2025Updated 3 months ago
- Quick ESXi Log Parser☆30Oct 20, 2025Updated 5 months ago
- Save toil in security operations with: Detection & Intelligence Analysis for New Alerts (D.I.A.N.A. )☆223Sep 4, 2024Updated last year
- Hunt for SQLite files used by various applications☆30Mar 1, 2026Updated 3 weeks ago
- CRADLE is a collaborative platform for Cyber Threat Intelligence analysts. It streamlines threat investigations with integrated note-taki…☆340Mar 15, 2026Updated last week
- NOVA: The Prompt Pattern Matching☆121Jan 27, 2026Updated last month
- Suzaku (朱雀) is a sigma-based threat hunting and fast forensics timeline generator for cloud logs.☆171Dec 7, 2025Updated 3 months ago
- Mapping of open-source detection rules and atomic tests.☆204Feb 16, 2026Updated last month
- Security tool against dependency typosquatting attacks☆55Updated this week
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆41May 7, 2023Updated 2 years ago
- ☆163Nov 19, 2025Updated 4 months ago
- 🖥️ Windows 🚀 A Windows tool for emergency privacy: instantly deletes sensitive data and active logins to protect my information during …☆54Jan 26, 2026Updated last month
- Substation is a toolkit for routing, normalizing, and enriching security event and audit logs.☆391Jan 20, 2026Updated 2 months ago
- 🌑 EclipseRecon is a personal project developed during my cybersecurity learning journey 🛡️. It helps practice web reconnaissance 🌐 by …☆29Nov 26, 2025Updated 3 months ago
- 🐻❄️ 🏹 Threat hunting with Polars and flaws.cloud AWS CloudTrail datasets.☆14May 22, 2024Updated last year
- Generate datasets of cloud audit logs for common attacks☆235Mar 9, 2026Updated 2 weeks ago
- Generates a detailed CSV file containing Sigma Rules statistics for each service or category, and each level, offering a holistic view of…☆10Dec 22, 2023Updated 2 years ago
- Feed it a number. Your cloned voice does the social engineering, while you sip your coffee. A ghost that talks on the phone for you.☆111May 30, 2025Updated 9 months ago
- Listener that spawns a new tmux window for each incoming reverse shell + Supports listening on many ports☆60Jul 13, 2025Updated 8 months ago
- SimpleCrypt is a powerful command-line tool designed for securely encrypting and decrypting files and directories using AES-256 encryptio…☆20Nov 10, 2025Updated 4 months ago
- Nakamoto is a 2 layer encryption tool to protect your data and your cyptocurrency☆15Nov 13, 2025Updated 4 months ago
- BlueSky OSINT Tool☆14Dec 10, 2024Updated last year
- A lightweight PowerShell tool for assessing the security posture of Microsoft Entra ID environments. It helps identify privileged object…☆342Mar 16, 2026Updated last week
- Addon for BHCE☆58Apr 1, 2025Updated 11 months ago
- Terms of Use Conditional Access M365 Evilginx Phishlet☆44Jun 23, 2025Updated 9 months ago
- A proof of concept AMSI & ETW bypass using trampolines for hooking and modifying execution flow☆18Jun 26, 2025Updated 8 months ago