pocket guide for core detection engineering concepts
☆31May 8, 2023Updated 2 years ago
Alternatives and similar repositories for detection-engineering-pocket-guide
Users that are interested in detection-engineering-pocket-guide are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- pocket guide for core threat hunting concepts☆23May 6, 2020Updated 5 years ago
- kubernetes-for-soc aims to fast-track the learning curve for SOC analysts by enabling them to swiftly grasp the essential concepts and kn…☆56Dec 18, 2023Updated 2 years ago
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.☆341Apr 26, 2026Updated last week
- Substation is a toolkit for routing, normalizing, and enriching security event and audit logs.☆399Jan 20, 2026Updated 3 months ago
- 100 Days of YARA to be updated with rules & ideas as the year progresses☆60Jan 18, 2023Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- An index of publicly available and open-source threat detection rulesets.☆134Apr 17, 2025Updated last year
- Detection Engineering is a tactical function of a cybersecurity defense program that involves the design, implementation, and operation o…☆1,181Updated this week
- Built-in Panther detection rules and policies☆448Updated this week
- The Event Maturity Matrix (EMM) is a comprehensive framework that provides clarity regarding the capabilities and nuances of SaaS audit l…☆30Apr 16, 2026Updated 2 weeks ago
- 🐻❄️ 🏹 Threat hunting with Polars and flaws.cloud AWS CloudTrail datasets.☆14May 22, 2024Updated last year
- Easily write tests and fuzz many different programs.☆12Dec 13, 2022Updated 3 years ago
- All docker botnets acrued since early 2018 .... as of 2025 there is a stall in actors...tbd if updates beyond JAN 2025 will continue.☆20Jan 11, 2025Updated last year
- This project is an Ansible Role to execute Atomic Red Team tests against multiple machines by wrapping Invoke-AtomicRedTeam☆27Jul 4, 2024Updated last year
- DHCP Fingerprinting☆31Dec 15, 2020Updated 5 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- This repository contains the research and components of our research into using Sigma for AWS Incident Response.☆31Jul 12, 2023Updated 2 years ago
- A Python-native Detection as Code Framework☆19Jan 23, 2026Updated 3 months ago
- ☆40Nov 29, 2024Updated last year
- An OpenAI API Compatible Honeypot Gateway☆17Mar 17, 2025Updated last year
- Sigma Queries turned into KQL for Defender using pysigma☆12Mar 29, 2026Updated last month
- Whois for the Cloud: Recon tool for cloud provider attribution. Supports AWS, Azure, Google, Cloudflare, and Digital Ocean.☆184Oct 9, 2025Updated 6 months ago
- Swift code to parse the quarantine history database, Chrome history database, Safari history database, and Firefox history database on ma…☆16Dec 3, 2020Updated 5 years ago
- ☆18Sep 13, 2021Updated 4 years ago
- High resolution traffic measurement tool for Linux written in Go☆19Jul 28, 2019Updated 6 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Random Loot Generator for the TTRPG "Bunkers & Badasses"☆12Dec 9, 2024Updated last year
- Track progress and keep notes while working through likethecoins' CTI Self Study Plan☆29Aug 25, 2022Updated 3 years ago
- A preconfigured Velociraptor triage collector☆76Apr 20, 2026Updated 2 weeks ago
- A tool for interacting with live processes/containers☆22Sep 21, 2022Updated 3 years ago
- A PoC to Simulate Ransomware Attack on AWS Environment☆33Oct 14, 2024Updated last year
- Go linter for finding defer statements inside for loops☆26Nov 27, 2023Updated 2 years ago
- Save toil in security operations with: Detection & Intelligence Analysis for New Alerts (D.I.A.N.A. )☆223Sep 4, 2024Updated last year
- Helper scripts to automate the extraction of YARA rules from XProtectRemediators☆22Mar 5, 2024Updated 2 years ago
- Modron - Cloud security compliance☆34Dec 11, 2024Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆14Feb 10, 2022Updated 4 years ago
- This is a collection of threat detection rules / rules engines that I have come across.☆298May 5, 2024Updated 2 years ago
- ☆34Jun 12, 2024Updated last year
- ShellSweeping the evil.☆53Jun 18, 2024Updated last year
- A pure Go library for working with Structured Threat Information Expression (STIX™) version 2.x data☆27Apr 27, 2025Updated last year
- ✨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The …☆291Feb 5, 2024Updated 2 years ago
- Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.☆13Mar 20, 2024Updated 2 years ago