kunai-project / kunaiLinks
Threat-hunting tool for Linux
☆973Updated 3 weeks ago
Alternatives and similar repositories for kunai
Users that are interested in kunai are comparing it to the libraries listed below
Sorting:
- Deep Linux runtime visibility meets Wireshark☆294Updated last month
- A scalable file analysis and data generation platform that allows users to easily orchestrate arbitrary docker/vm/shell tools at scale.☆933Updated last week
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆386Updated 2 weeks ago
- MasterParser is a powerful DFIR tool designed for analyzing and parsing Linux logs☆742Updated last month
- Open Adversary Exposure Validation Platform☆1,387Updated this week
- BLint is a Binary Linter to check the security properties, and capabilities in your executables. Since v2, blint is also an SBOM generato…☆402Updated last month
- A rewrite of YARA in Rust.☆867Updated this week
- A modular vulnerability scanner with automatic report generation capabilities.☆932Updated this week
- Streamline vulnerability patching with CVSS, EPSS, and CISA's Known Exploited Vulnerabilities. Prioritize actions based on real-time thre…☆667Updated last month
- Vulnerability-Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streaml…☆365Updated this week
- A simple-to-use IR (incident response) case management tool for tracking and documenting investigations.☆364Updated 2 months ago
- Transform Linux Audit logs for SIEM usage☆788Updated last month
- DECeption with Evaluative Integrated Validation Engine (DECEIVE): Let an LLM do all the hard honeypot work!☆259Updated 3 months ago
- Dissect is a digital forensics & incident response framework and toolset that allows you to quickly access and analyse forensic artefacts…☆1,043Updated last week
- practical toolkit for cybersecurity and IT professionals. It features a detailed Linux cheatsheet for incident response☆400Updated last year
- Galah: An LLM-powered web honeypot.☆585Updated last month
- A centralized and enhanced memory analysis platform☆489Updated 2 months ago
- Linux Security and Monitoring Scripts☆325Updated 11 months ago
- A simple application that extracts your IoCs from garbage input and checks their reputation using multiple CTI services.☆454Updated this week
- ⚡️ Catalyst is a self-hosted, open source incident response platform and ticket system that helps to automate alert handling and incident…☆427Updated last week
- A production ready Dockered MISP☆279Updated this week
- Bitor Scanning Software☆406Updated last month
- Enterprise-ready SIEM, SOAR and Compliance powered by real-time correlation and threat intelligence.☆325Updated this week
- A repo to conduct vulnerability enrichment.☆681Updated this week
- Advanced Wazuh Rules for more accurate threat detection. Feel free to implement within your own Wazuh environment, contribute, or fork!☆1,070Updated last month
- Pen Test Report Generation and Assessment Collaboration☆563Updated 2 weeks ago
- A website and framework for testing NIDS detection☆284Updated 2 months ago
- This repository contains Open Source freely usable Threat Intel feeds that can be used without additional requirements. Contains multiple…☆708Updated 7 months ago
- PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection…☆711Updated last month
- Customizable Linux Persistence Tool for Security Research and Detection Engineering.☆777Updated 6 months ago