kunai-project / kunaiLinks
Threat-hunting tool for Linux
☆1,029Updated last month
Alternatives and similar repositories for kunai
Users that are interested in kunai are comparing it to the libraries listed below
Sorting:
- A scalable file analysis and data generation platform that allows users to easily orchestrate arbitrary docker/vm/shell tools at scale.☆972Updated 3 weeks ago
- Deep Linux runtime visibility meets Wireshark☆299Updated last month
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆483Updated 2 weeks ago
- A rewrite of YARA in Rust.☆976Updated last week
- MasterParser is a powerful DFIR tool designed for analyzing and parsing Linux logs☆744Updated 4 months ago
- Open Adversarial Exposure Validation Platform☆1,457Updated this week
- blint is a Binary Linter that checks the security properties and capabilities of your executables. It can also generate a Software Bill-o…☆429Updated last month
- Enterprise-ready SIEM, SOAR and Compliance powered by real-time correlation and threat intelligence.☆513Updated this week
- Vulnerability-Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streaml…☆422Updated last week
- Transform Linux Audit logs for SIEM usage☆807Updated 2 weeks ago
- Galah: An LLM-powered web honeypot.☆625Updated 5 months ago
- A modular vulnerability scanner with automatic report generation capabilities.☆1,085Updated last week
- DECeption with Evaluative Integrated Validation Engine (DECEIVE): Let an LLM do all the hard honeypot work!☆270Updated 6 months ago
- ⚡️ Catalyst is a self-hosted, open source incident response platform and ticket system that helps to automate alert handling and incident…☆499Updated last week
- A simple-to-use IR (incident response) case management tool for tracking and documenting investigations.☆433Updated 2 months ago
- RansomLord is a proof-of-concept Anti-Ransomware exploitation tool that automates the creation of PE files, used to compromise ransomware…☆516Updated 6 months ago
- A centralized and enhanced memory analysis platform☆512Updated 5 months ago
- Advanced Wazuh Rules for more accurate threat detection. Feel free to implement within your own Wazuh environment, contribute, or fork!☆1,182Updated 2 weeks ago
- UAC is a powerful and extensible incident response tool designed for forensic investigators, security analysts, and IT professionals. It …☆1,212Updated last week
- A website and framework for testing NIDS detection☆309Updated 5 months ago
- A simple application that extracts your IoCs from garbage input and checks their reputation using multiple CTI services.☆478Updated this week
- Streamline vulnerability patching with CVSS, EPSS, and CISA's Known Exploited Vulnerabilities. Prioritize actions based on real-time thre…☆681Updated 2 months ago
- Microsoft ICSpector (ICS Forensics Tools framework) is an open-source forensics framework that enables the analysis of Industrial PLC met…☆364Updated 3 months ago
- Dissect is a digital forensics & incident response framework and toolset that allows you to quickly access and analyse forensic artefacts…☆1,054Updated last month
- Customizable Linux Persistence Tool for Security Research and Detection Engineering.☆833Updated 9 months ago
- SOCFortress CoPilot☆422Updated this week
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆448Updated last week
- PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection…☆719Updated 4 months ago
- A free and open platform for detecting and preventing email attacks like BEC, malware, and credential phishing. Gain visibility and contr…☆239Updated last week
- Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.☆2,964Updated 2 weeks ago