☆106Dec 9, 2025Updated 3 months ago
Alternatives and similar repositories for pivot-atlas
Users that are interested in pivot-atlas are comparing it to the libraries listed below
Sorting:
- A collection of my public YARA signatures for various malware families☆30Sep 20, 2024Updated last year
- SACTI - Securely aggregate CTI sightings and report them on MISP☆14Oct 24, 2022Updated 3 years ago
- ShellSweeping the evil.☆53Jun 18, 2024Updated last year
- CloudPathSniffer is an open-source, easy to use and extensible Cloud Anomaly Detection platform designed to help security teams to find h…☆13Nov 30, 2023Updated 2 years ago
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆282Mar 20, 2025Updated 11 months ago
- Remote access and Antivirus Logging Database☆45Apr 28, 2024Updated last year
- An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.☆202Jul 3, 2024Updated last year
- Suzaku (朱雀) is a sigma-based threat hunting and fast forensics timeline generator for cloud logs.☆168Dec 7, 2025Updated 3 months ago
- 100 Days of YARA to be updated with rules & ideas as the year progresses☆60Jan 18, 2023Updated 3 years ago
- Repository that contains a set of purposefully erroneous Yara rules.☆61Jul 23, 2025Updated 7 months ago
- MISP Playbooks☆222Oct 14, 2025Updated 4 months ago
- Yet another way to find where to report an abuse☆31Jan 25, 2025Updated last year
- Invictus Threat Intelligence: IOCs and TTPs from blogs, research and more☆30Nov 26, 2025Updated 3 months ago
- Augmentation to Machine Readable CTI☆37Sep 9, 2025Updated 6 months ago
- Get started using Synapse Open-Source to start a Cortex and perform analysis within your area of expertise.☆50May 16, 2022Updated 3 years ago
- CLI tool to compute the TypeRefHash for .NET binaries.☆19Nov 10, 2021Updated 4 years ago
- ☆11May 13, 2024Updated last year
- Create a cool process tree like https://twitter.com/ACEResponder.☆35Mar 1, 2023Updated 3 years ago
- Emulates the VirusTotal "vt" YARA module for livehunt rule debugging/testing☆24May 29, 2023Updated 2 years ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆55Dec 5, 2024Updated last year
- Repository of tools, YARA rules, and code-snippets from Stairwell's research team.☆23Jan 31, 2024Updated 2 years ago
- Cyber Underground General Intelligence Requirements☆98Feb 2, 2024Updated 2 years ago
- TIM is a Kusto investigation platform that enables a user to quickly pivot between data sources; annotate their findings; and promotes co…☆23Aug 7, 2024Updated last year
- custom Python script to perform Yara matching in Cortex XDR☆14May 18, 2021Updated 4 years ago
- Yara rules☆22Mar 27, 2023Updated 2 years ago
- A flexible threat detection platform that simplifies rule management and deployment using K8s CronJob and Helm, but can also run standalo…☆384Oct 1, 2024Updated last year
- ☆120Dec 6, 2025Updated 3 months ago
- ☆23Mar 17, 2024Updated last year
- Autopsy Module to analyze Registry Hives☆16Feb 18, 2022Updated 4 years ago
- ☆96Dec 25, 2025Updated 2 months ago
- This project aims to compare and evaluate the telemetry of various EDR products.☆1,931Jan 20, 2026Updated last month
- LotL RMM☆313Updated this week
- DFIQ is a collection of investigative questions and the approaches for answering them☆300Jan 17, 2025Updated last year
- Helm charts for running open source digital forensic tools in Kubernetes☆185Feb 27, 2026Updated last week
- C2 Active Scanner☆59Jun 19, 2024Updated last year
- A collection of methods to learn who the owner of an IP address is.☆224Sep 29, 2025Updated 5 months ago
- Automatically created C2 Feeds☆667Updated this week
- CSIRT Tooling: Best Practices in Developing, Maintaining and Distributing Open Source Tools☆16Feb 26, 2026Updated last week
- Web Application for domain name monitoring / alerting☆64Aug 1, 2024Updated last year