kunai-project / kunaiLinks
Threat-hunting tool for Linux
☆938Updated last month
Alternatives and similar repositories for kunai
Users that are interested in kunai are comparing it to the libraries listed below
Sorting:
- Deep Linux runtime visibility meets Wireshark☆292Updated 3 weeks ago
- Open Adversary Exposure Validation Platform☆1,077Updated this week
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆317Updated last week
- A rewrite of YARA in Rust.☆818Updated last week
- MasterParser is a powerful DFIR tool designed for analyzing and parsing Linux logs☆733Updated 3 months ago
- BLint is a Binary Linter to check the security properties, and capabilities in your executables. Since v2, blint is also an SBOM generato…☆392Updated last month
- Transform Linux Audit logs for SIEM usage☆774Updated 2 weeks ago
- A centralized and enhanced memory analysis platform☆468Updated last month
- Galah: An LLM-powered web honeypot.☆552Updated this week
- Vulnerability-Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streaml…☆334Updated this week
- ⚡️ Catalyst is a self-hosted, open source incident response platform and ticket system that helps to automate alert handling and incident…☆408Updated 2 weeks ago
- Streamline vulnerability patching with CVSS, EPSS, and CISA's Known Exploited Vulnerabilities. Prioritize actions based on real-time thre…☆654Updated 3 months ago
- Dissect is a digital forensics & incident response framework and toolset that allows you to quickly access and analyse forensic artefacts…☆1,024Updated 3 weeks ago
- A simple application that extracts your IoCs from garbage input and checks their reputation using multiple CTI services.☆439Updated this week
- A production ready Dockered MISP☆255Updated last week
- Collaborative Incident Response platform☆1,214Updated this week
- DECeption with Evaluative Integrated Validation Engine (DECEIVE): Let an LLM do all the hard honeypot work!☆259Updated last month
- UAC is a powerful and extensible incident response tool designed for forensic investigators, security analysts, and IT professionals. It …☆1,015Updated this week
- practical toolkit for cybersecurity and IT professionals. It features a detailed Linux cheatsheet for incident response☆398Updated last year
- Bitor Scanning Software☆391Updated this week
- SOCFortress CoPilot☆296Updated this week
- Enterprise-ready SIEM, SOAR and Compliance powered by real-time correlation and threat intelligence.☆283Updated this week
- Linux Security and Monitoring Scripts☆324Updated 9 months ago
- A free and open platform for detecting and preventing email attacks like BEC, malware, and credential phishing. Gain visibility and contr…☆219Updated last month
- A repo to conduct vulnerability enrichment.☆655Updated this week
- A simple-to-use IR (incident response) case management tool for tracking and documenting investigations.☆217Updated 2 weeks ago
- Sysmon for Linux☆1,913Updated 2 weeks ago
- PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection…☆702Updated 2 weeks ago
- Advanced Wazuh Rules for more accurate threat detection. Feel free to implement within your own Wazuh environment, contribute, or fork!☆802Updated last week
- OT security monitoring #nsacyber☆598Updated last year