kunai-project / kunai
Threat-hunting tool for Linux
☆802Updated last month
Alternatives and similar repositories for kunai:
Users that are interested in kunai are comparing it to the libraries listed below
- Deep Linux runtime visibility meets Wireshark☆286Updated last month
- Open Attack Simulation & Security Validation Platform☆956Updated this week
- MasterParser is a powerful DFIR tool designed for analyzing and parsing Linux logs☆717Updated 9 months ago
- BLint is a Binary Linter to check the security properties, and capabilities in your executables. Since v2, blint is also an SBOM generato…☆358Updated this week
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆266Updated last week
- Transform Linux Audit logs for SIEM usage☆754Updated last week
- ☆258Updated 4 months ago
- SOCFortress CoPilot☆263Updated this week
- This repository contains Open Source freely usable Threat Intel feeds that can be used without additional requirements. Contains multiple…☆651Updated last month
- Logging Made Easy (LME) is a no cost, open source platform that centralizes log collection, enhances threat detection, and enables real-…☆980Updated this week
- Vulnerability-Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streaml…☆220Updated this week
- Streamline vulnerability patching with CVSS, EPSS, and CISA's Known Exploited Vulnerabilities. Prioritize actions based on real-time thre…☆614Updated last week
- Orbit Scanning Software☆352Updated 2 weeks ago
- A simple application that extracts your IoCs from garbage input and checks their reputation using multiple CTI services.☆326Updated 2 weeks ago
- Advanced Wazuh Rules for more accurate threat detection. Feel free to implement within your own Wazuh environment, contribute, or fork!☆699Updated this week
- Collaborative Incident Response platform☆1,161Updated this week
- DECeption with Evaluative Integrated Validation Engine (DECEIVE): Let an LLM do all the hard honeypot work!☆225Updated this week
- Dissect is a digital forensics & incident response framework and toolset that allows you to quickly access and analyse forensic artefacts…☆967Updated 2 weeks ago
- Check subdomains for subdomain takeovers and other DNS tomfoolery☆324Updated this week
- ⚡️ Catalyst is a self-hosted, open source incident response platform and ticket system that helps to automate alert handling and incident…☆386Updated this week
- A rewrite of YARA in Rust.☆727Updated this week
- Pen Test Report Generation and Assessment Collaboration☆475Updated this week
- Awesome list of keywords and artifacts for Threat Hunting sessions☆553Updated 3 weeks ago
- A standard for reducing log volume without sacrificing analytical capability☆203Updated last month
- RansomLord is a proof-of-concept Anti-Ransomware exploitation tool that automates the creation of PE files, used to compromise ransomware…☆504Updated 3 months ago
- Awesome Security lists for SOC/CERT/CTI☆905Updated this week
- A repo to conduct vulnerability enrichment.☆587Updated this week
- OT security monitoring #nsacyber☆589Updated last year
- Nmap Dashboard Mini Project☆575Updated 9 months ago
- Live Feed of C2 servers, tools, and botnets☆602Updated this week