pocket guide for core detection engineering concepts
☆31May 8, 2023Updated 2 years ago
Alternatives and similar repositories for detection-engineering-pocket-guide
Users that are interested in detection-engineering-pocket-guide are comparing it to the libraries listed below
Sorting:
- The Event Maturity Matrix (EMM) is a comprehensive framework that provides clarity regarding the capabilities and nuances of SaaS audit l…☆30Feb 23, 2026Updated last week
- ☆11Sep 14, 2020Updated 5 years ago
- pocket guide for core threat hunting concepts☆23May 6, 2020Updated 5 years ago
- Easily write tests and fuzz many different programs.☆12Dec 13, 2022Updated 3 years ago
- Swift code to parse the quarantine history database, Chrome history database, Safari history database, and Firefox history database on ma…☆15Dec 3, 2020Updated 5 years ago
- Track progress and keep notes while working through likethecoins' CTI Self Study Plan☆29Aug 25, 2022Updated 3 years ago
- DHCP Fingerprinting☆31Dec 15, 2020Updated 5 years ago
- 🐻❄️ 🏹 Threat hunting with Polars and flaws.cloud AWS CloudTrail datasets.☆14May 22, 2024Updated last year
- ☆19Jan 31, 2025Updated last year
- 100 Days of YARA to be updated with rules & ideas as the year progresses☆60Jan 18, 2023Updated 3 years ago
- Modron - Cloud security compliance☆34Dec 11, 2024Updated last year
- ☆33Jun 12, 2024Updated last year
- (Unofficial) Ruby wrapper for the Bugcrowd HTTP API☆14Feb 27, 2017Updated 9 years ago
- A framework and taxonomy for identifying, classifying, and reasoning about detection logic bugs in SIEM, EDR, and XDR rules, with concret…☆42Feb 22, 2026Updated last week
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆14Feb 10, 2022Updated 4 years ago
- Built-in Panther detection rules and policies☆439Updated this week
- Detection Engineering is a tactical function of a cybersecurity defense program that involves the design, implementation, and operation o…☆1,142Dec 19, 2025Updated 2 months ago
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.☆338Feb 13, 2026Updated 2 weeks ago
- A Software as a Service (SaaS) log collection framework.☆182Jan 16, 2026Updated last month
- Better Exploit Code For CVE 2017 9805 apache struts☆20Dec 23, 2017Updated 8 years ago
- A combined list of helpful awscli commands from Scott Piper's flaws.cloud exercise as well as from Beau Bullock's Breaching the Cloud Tra…☆19Mar 1, 2021Updated 5 years ago
- An OpenAI API Compatible Honeypot Gateway☆17Mar 17, 2025Updated 11 months ago
- ☆40Nov 29, 2024Updated last year
- ☆34Apr 29, 2021Updated 4 years ago
- An index of publicly available and open-source threat detection rulesets.☆130Apr 17, 2025Updated 10 months ago
- High resolution traffic measurement tool for Linux written in Go☆19Jul 28, 2019Updated 6 years ago
- A tool for interacting with live processes/containers☆22Sep 21, 2022Updated 3 years ago
- ☆18Sep 13, 2021Updated 4 years ago
- Proof of Concept files for SensePost's blog - Painless intro to the linux userland heap☆22Aug 15, 2017Updated 8 years ago
- ☆15Jul 20, 2022Updated 3 years ago
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆282Mar 20, 2025Updated 11 months ago
- This is a collection of threat detection rules / rules engines that I have come across.☆296May 5, 2024Updated last year
- All docker botnets acrued since early 2018 .... as of 2025 there is a stall in actors...tbd if updates beyond JAN 2025 will continue.☆20Jan 11, 2025Updated last year
- Save toil in security operations with: Detection & Intelligence Analysis for New Alerts (D.I.A.N.A. )☆224Sep 4, 2024Updated last year
- Collection of example YARA-L rules for use within Google Security Operations☆473Dec 5, 2025Updated 3 months ago
- This repository contains a set of rules samples that can be directly used with Trellix Endpoint Security, in the Exploit Prevention polic…☆29Feb 26, 2026Updated last week
- ☆23Sep 20, 2024Updated last year
- DEbian Cve REproducer Tool☆27Jan 8, 2026Updated last month
- PoC shadow SaaS and insecure credential detection system using a browser extension.☆42Feb 8, 2026Updated 3 weeks ago