π‘οΈ SIGMA Detection Engineering Platform A comprehensive AI-powered detection engineering platform for security teams to explore MITRE ATT&CK, build SIGMA rules, and visualize attack paths.
β45Jun 28, 2025Updated 9 months ago
Alternatives and similar repositories for DEF3ND
Users that are interested in DEF3ND are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- β68Updated this week
- A starter pack of resources to help you get started in Detection Engineering.β186Jan 17, 2026Updated 3 months ago
- Scripts for importing threat feeds and CTI articles, blogs, and reports into MISP.β18Jun 16, 2025Updated 10 months ago
- Threat feeds designed to extract adversarial TTPs and IOCs, using: β¨AIβ¨β69Apr 5, 2026Updated 2 weeks ago
- Jupyter Univere is a search engine for all infosec jupyter notebooksβ36Mar 24, 2025Updated last year
- Deploy open-source AI quickly and easily - Bonus Offer β’ AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- A curated list of AI driven Cyber security Resourcesβ48Mar 28, 2026Updated 3 weeks ago
- An AI-powered plugin for Caldera that orchestrates long-running LLM workflows to automatically create adversary emulation abilities and pβ¦β26Mar 18, 2026Updated last month
- yara detection rules for hunting with the threathunting-keywords projectβ159May 11, 2025Updated 11 months ago
- Repo for experimenting and testing MCP server builds for CTI-related research.β27May 13, 2025Updated 11 months ago
- This repository provides insight on how to get started with Microsoft Securityβ11Nov 27, 2025Updated 4 months ago
- Config files for my GitHub profile.β14May 7, 2023Updated 2 years ago
- Cyber Threats Detection Rulesβ14Sep 16, 2025Updated 7 months ago
- This repository contains OpenIOC rules to aid in hunting for indicators of compromise and TTPs focused on Advanced Persistent Threat grouβ¦β26Oct 3, 2023Updated 2 years ago
- This is a repository to experiment with MCP for securityβ47Jan 22, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient β’ AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- When Your Vision Reaches Beyond IAM Boundary Scope in AWS Cloudβ45Dec 7, 2025Updated 4 months ago
- A package to create HTML MISP reports, including volume of trending events and attributes, evens received from key organisations and targβ¦β12Aug 14, 2025Updated 8 months ago
- An experimental project using LLM technology to generate security documentation for Open Source Software (OSS) projectsβ37Feb 28, 2025Updated last year
- AI-powered cybersecurity attack flow visualization tool using MITRE ATT&CKβ215Mar 4, 2026Updated last month
- Kusto and Log Analytics MCP server help you execute a KQL (Kusto Query Language) query within an AI prompt, analyze, and visualize the daβ¦β23Mar 18, 2026Updated last month
- KustoHawk is a lightweight incident triage and response tool designed for effective incident response in Microsoft Defender XDR and Microβ¦β149Apr 1, 2026Updated 2 weeks ago
- Automate Checkmarx Scanning and Onboarding Plus AWS Accessβ12Jan 5, 2023Updated 3 years ago
- Splunk app to compare Endpoint Detection and Response solutions based on MITRE ATT&CK evaluations (APT3, APT29, Carbanak + FIN7, Wizard Sβ¦β19Sep 5, 2022Updated 3 years ago
- Node.js implementation of the PirateBox Server inspired by David Dartsβ15Dec 8, 2015Updated 10 years ago
- AI Agents on DigitalOcean Gradient AI Platform β’ AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Forensic tool for extracting and analyzing Google DriveFS cached files and metadata.β20May 9, 2025Updated 11 months ago
- Alternative password shadowing schemeβ10Feb 22, 2026Updated last month
- This directory contains presentations and related materials of my speaking engagements. I also use this to record historical presentationβ¦β17Feb 13, 2025Updated last year
- β11Feb 9, 2023Updated 3 years ago
- A Windows Event Log MCPβ43Aug 25, 2025Updated 7 months ago
- Simple Chatbot for testing AI Red Team toolingβ17Feb 11, 2025Updated last year
- A security tool designed to help review merged code changes to open source maintained repositories via LLM assisted review to safeguard aβ¦β32Oct 20, 2024Updated last year
- MISP Playbooksβ224Oct 14, 2025Updated 6 months ago
- Indicators of Compromise (IOCs) accompanying HP Threat Research blog posts and reports.β29Apr 10, 2024Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient β’ AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Home for Splunk security datasets.β131Mar 18, 2020Updated 6 years ago
- π Real-time threat detection for smart contractsβ10May 16, 2023Updated 2 years ago
- [ICLR 2025 SCI-FM Workshop] Lemur: Log Parsing with Entropy Sampling and Chain-of-Thought Mergingβ14Mar 27, 2025Updated last year
- Event Query Routerβ12Aug 9, 2019Updated 6 years ago
- A repository hosting example goodware evtx logs containing sample software installation and basic user interactionβ88Mar 11, 2026Updated last month
- Supply Chain Security Research - Attack Treesβ10Jan 9, 2023Updated 3 years ago
- A cybersecurity dataset consisting of 4.3 million entries of Twitter, Blogs, Paper, and CVEsβ20May 26, 2023Updated 2 years ago