☆60Feb 27, 2026Updated last week
Alternatives and similar repositories for detection-engineering
Users that are interested in detection-engineering are comparing it to the libraries listed below
Sorting:
- ☆20Jan 12, 2022Updated 4 years ago
- The Public Physical Pentesting Paraphernalia Project (P5) is a collection of 3D printing models, DIY tool instructions and entry-level me…☆12Sep 6, 2019Updated 6 years ago
- Some important DFIR Resources☆84Mar 16, 2023Updated 2 years ago
- A powerful macOS triage collection tool designed for forensic analysis. It gathers critical system artifacts such as FSEvents, Spotlight,…☆35Oct 24, 2025Updated 4 months ago
- Contains compiled binaries of Volatility☆36May 18, 2025Updated 9 months ago
- Maintained by the ANY.RUN team, this repository provides YARA rules to help detect and classify various malware families and other malici…☆26Nov 1, 2025Updated 4 months ago
- KQL Queries☆33Feb 17, 2026Updated 2 weeks ago
- ☆18Mar 13, 2022Updated 3 years ago
- ☆22Aug 29, 2024Updated last year
- 📚A curated list of product security resources.☆23Jun 11, 2025Updated 8 months ago
- This home-lab provides individuals with hands-on experience in setting up, configuring, and utilizing Suricata to enhance network securit…☆30Apr 10, 2024Updated last year
- A repository dedicated to tracking ransomware families based on leaked builders.☆22Apr 17, 2024Updated last year
- ☆33Aug 25, 2021Updated 4 years ago
- ☆36Aug 23, 2022Updated 3 years ago
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆60Mar 12, 2022Updated 3 years ago
- A GeoIP lookup utility utilizing ipinfo.io services.☆30Dec 1, 2023Updated 2 years ago
- Learn 101 is a challenge to keep the learning spirit going on and challenge myself to learn something daily for 101 days.☆30Jun 7, 2022Updated 3 years ago
- Online resources related to SOC Analysts. Incident investigation reference material, blogs, newsletters, good reads, books, trainings, po…☆42Feb 14, 2026Updated 2 weeks ago
- Labs for Practical Malware Analysis & Triage☆1,084Feb 23, 2026Updated last week
- Damn Vulnerable Cloud Application☆208Sep 12, 2018Updated 7 years ago
- This script enhances endpoint logging telemetry for the purpose of advanced malware threat detection or for building detections or malwar…☆41Apr 7, 2025Updated 10 months ago
- A curated checklist of tasks to be done during engagements☆34Aug 30, 2024Updated last year
- Community content for LogRhythm Axon. Includes Dashboards, searches, analytics rules, processing policies and more.☆10Jul 26, 2024Updated last year
- Damn Vulnerable PHP Application (DVPA) - It is Lab Written in The PHP lang, Which Contains PHP Type Juggling - RCE Challenges☆32May 18, 2022Updated 3 years ago
- unix_collector is a Live Response collection script for Incident Response on UNIX-like systems using native binaries. Supports AIX, Andro…☆41Jun 10, 2025Updated 8 months ago
- Cybersecurity Psychology Framework☆19Feb 22, 2026Updated last week
- ☆210Mar 4, 2022Updated 4 years ago
- Random notes collected on the intertubes relating to DFIR☆35Jun 26, 2023Updated 2 years ago
- Jupyter Notebooks for the Blue Team☆39Jan 16, 2025Updated last year
- Venture: Cross-Platform GUI tool for parsing and analyzing Windows event logs☆92Jan 23, 2025Updated last year
- Dump macOS 1.8+ password hashes to a hashcat-compatible format☆14May 29, 2022Updated 3 years ago
- OWASP Coimbatore's Web & Project Repository☆13Jan 23, 2026Updated last month
- Network Shredder IDS☆11Aug 14, 2024Updated last year
- ☆11May 30, 2021Updated 4 years ago
- Lazy SPL to detect Spring4Shell exploitation☆12Jul 8, 2022Updated 3 years ago
- Do It Yourself! (DIY) Web Penetration Testing is a guideline in performing security test cases against web applications☆39Aug 9, 2023Updated 2 years ago
- Some notes written during my OSCP Journey (KeepNote project)☆10Mar 2, 2020Updated 6 years ago
- The Windows Malware Analysis Reversing Core Tools☆98Dec 21, 2020Updated 5 years ago
- ☆42Mar 6, 2023Updated 3 years ago