pocket guide for core detection engineering concepts
☆31May 8, 2023Updated 2 years ago
Alternatives and similar repositories for detection-engineering-pocket-guide
Users that are interested in detection-engineering-pocket-guide are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- pocket guide for core threat hunting concepts☆23May 6, 2020Updated 5 years ago
- kubernetes-for-soc aims to fast-track the learning curve for SOC analysts by enabling them to swiftly grasp the essential concepts and kn…☆56Dec 18, 2023Updated 2 years ago
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.☆339Mar 17, 2026Updated last week
- Substation is a toolkit for routing, normalizing, and enriching security event and audit logs.☆393Jan 20, 2026Updated 2 months ago
- An index of publicly available and open-source threat detection rulesets.☆130Apr 17, 2025Updated 11 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Detection Engineering is a tactical function of a cybersecurity defense program that involves the design, implementation, and operation o…☆1,155Dec 19, 2025Updated 3 months ago
- Built-in Panther detection rules and policies☆441Updated this week
- The Event Maturity Matrix (EMM) is a comprehensive framework that provides clarity regarding the capabilities and nuances of SaaS audit l…☆30Feb 23, 2026Updated last month
- 🐻❄️ 🏹 Threat hunting with Polars and flaws.cloud AWS CloudTrail datasets.☆14May 22, 2024Updated last year
- Easily write tests and fuzz many different programs.☆12Dec 13, 2022Updated 3 years ago
- DHCP Fingerprinting☆31Dec 15, 2020Updated 5 years ago
- A Software as a Service (SaaS) log collection framework.☆185Mar 16, 2026Updated last week
- This repository contains the research and components of our research into using Sigma for AWS Incident Response.☆31Jul 12, 2023Updated 2 years ago
- ☆40Nov 29, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- An OpenAI API Compatible Honeypot Gateway☆17Mar 17, 2025Updated last year
- Sigma Queries turned into KQL for Defender using pysigma☆12Jun 20, 2024Updated last year
- Whois for the Cloud: Recon tool for cloud provider attribution. Supports AWS, Azure, Google, Cloudflare, and Digital Ocean.☆183Oct 9, 2025Updated 5 months ago
- ☆34Apr 29, 2021Updated 4 years ago
- Swift code to parse the quarantine history database, Chrome history database, Safari history database, and Firefox history database on ma…☆16Dec 3, 2020Updated 5 years ago
- ☆18Sep 13, 2021Updated 4 years ago
- High resolution traffic measurement tool for Linux written in Go☆19Jul 28, 2019Updated 6 years ago
- Track progress and keep notes while working through likethecoins' CTI Self Study Plan☆29Aug 25, 2022Updated 3 years ago
- A preconfigured Velociraptor triage collector☆76Mar 2, 2026Updated 3 weeks ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A framework and taxonomy for identifying, classifying, and reasoning about detection logic bugs in SIEM, EDR, and XDR rules, with concret…☆45Mar 5, 2026Updated 3 weeks ago
- A PoC to Simulate Ransomware Attack on AWS Environment☆33Oct 14, 2024Updated last year
- Go linter for finding defer statements inside for loops☆26Nov 27, 2023Updated 2 years ago
- Save toil in security operations with: Detection & Intelligence Analysis for New Alerts (D.I.A.N.A. )☆223Sep 4, 2024Updated last year
- ☆16Aug 2, 2025Updated 7 months ago
- Helper scripts to automate the extraction of YARA rules from XProtectRemediators☆22Mar 5, 2024Updated 2 years ago
- Modron - Cloud security compliance☆34Dec 11, 2024Updated last year
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆14Feb 10, 2022Updated 4 years ago
- A curated list of resources about detecting threats and defending Kubernetes systems.☆407Sep 2, 2023Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- This is a collection of threat detection rules / rules engines that I have come across.☆297May 5, 2024Updated last year
- ☆33Jun 12, 2024Updated last year
- ShellSweeping the evil.☆53Jun 18, 2024Updated last year
- ☆60Feb 27, 2026Updated 3 weeks ago
- A pure Go library for working with Structured Threat Information Expression (STIX™) version 2.x data☆27Apr 27, 2025Updated 10 months ago
- ✨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The …☆290Feb 5, 2024Updated 2 years ago
- Better Exploit Code For CVE 2017 9805 apache struts☆20Dec 23, 2017Updated 8 years ago