☆60Feb 27, 2026Updated last month
Alternatives and similar repositories for detection-engineering
Users that are interested in detection-engineering are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This home-lab provides individuals with hands-on experience in setting up, configuring, and utilizing Suricata to enhance network securit…☆30Apr 10, 2024Updated last year
- This is a VxLAN PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆28Jul 21, 2025Updated 8 months ago
- The Public Physical Pentesting Paraphernalia Project (P5) is a collection of 3D printing models, DIY tool instructions and entry-level me…☆12Sep 6, 2019Updated 6 years ago
- pocket guide for core detection engineering concepts☆31May 8, 2023Updated 2 years ago
- ☆20Jan 12, 2022Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Maintained by the ANY.RUN team, this repository provides YARA rules to help detect and classify various malware families and other malici…☆26Nov 1, 2025Updated 4 months ago
- Some important DFIR Resources☆84Mar 16, 2023Updated 3 years ago
- Contains compiled binaries of Volatility☆36May 18, 2025Updated 10 months ago
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆60Mar 12, 2022Updated 4 years ago
- A small threat model for a smart home☆18Oct 8, 2019Updated 6 years ago
- Detection Engineering is a tactical function of a cybersecurity defense program that involves the design, implementation, and operation o…☆1,155Dec 19, 2025Updated 3 months ago
- Resources for TCM Security Linux 101 course☆313Jul 4, 2023Updated 2 years ago
- Zeek package for tracking long connections to report them before they have completed.☆31Nov 25, 2025Updated 4 months ago
- This module installs and configures MISP (Malware Information Sharing Platform)☆14Mar 6, 2026Updated 3 weeks ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- HEVD Exploits for fun and learning.☆15Aug 30, 2025Updated 6 months ago
- Ekoparty's BlueSpace Keynote November 2021. Shoutout to @plugxor Muchas Gracias!!!☆13Jun 5, 2023Updated 2 years ago
- CSharp4Pentesters☆11Mar 5, 2022Updated 4 years ago
- This is a tutorial and introduction to Reflective DLL Injection + reading outputs of injected dll using named pipes.☆20Feb 8, 2025Updated last year
- ☆12Sep 10, 2022Updated 3 years ago
- Cheatsheet, Notes, Payloads and Mayhem for Burp Suite Practitioner Exam (BSCP)☆44Jan 31, 2026Updated last month
- DHCP Fingerprinting☆31Dec 15, 2020Updated 5 years ago
- 📚A curated list of product security resources.