kunai-project / kunaiLinks
Threat-hunting tool for Linux
☆887Updated last week
Alternatives and similar repositories for kunai
Users that are interested in kunai are comparing it to the libraries listed below
Sorting:
- Deep Linux runtime visibility meets Wireshark☆291Updated 3 weeks ago
- Open Adversary Exposure Validation Platform☆1,040Updated this week
- MasterParser is a powerful DFIR tool designed for analyzing and parsing Linux logs☆729Updated last month
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆298Updated last week
- Streamline vulnerability patching with CVSS, EPSS, and CISA's Known Exploited Vulnerabilities. Prioritize actions based on real-time thre…☆646Updated 2 months ago
- BLint is a Binary Linter to check the security properties, and capabilities in your executables. Since v2, blint is also an SBOM generato…☆370Updated last month
- Awesome Security lists for SOC/CERT/CTI☆984Updated this week
- A centralized and enhanced memory analysis platform☆463Updated 2 weeks ago
- CLI tools for forensic investigation of Windows artifacts☆339Updated 7 months ago
- PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection…☆675Updated this week
- Transform Linux Audit logs for SIEM usage☆767Updated 3 weeks ago
- ⚡️ Catalyst is a self-hosted, open source incident response platform and ticket system that helps to automate alert handling and incident…☆401Updated this week
- A rewrite of YARA in Rust.☆769Updated this week
- Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.☆2,630Updated this week
- Customizable Linux Persistence Tool for Security Research and Detection Engineering.☆652Updated 3 months ago
- Collaborative Incident Response platform☆1,201Updated last week
- Vulnerability-Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streaml…☆300Updated this week
- Pen Test Report Generation and Assessment Collaboration☆526Updated last week
- Python library to parse and convert Sigma rules into queries (and whatever else you could imagine)☆460Updated this week
- Logging Made Easy (LME) is a no cost, open source platform that centralizes log collection, enhances threat detection, and enables real-…☆1,046Updated this week
- Advanced Wazuh Rules for more accurate threat detection. Feel free to implement within your own Wazuh environment, contribute, or fork!☆752Updated this week
- Awesome list of keywords and artifacts for Threat Hunting sessions☆576Updated last month
- A resource containing all the tools each ransomware gangs uses☆1,042Updated last week
- DECeption with Evaluative Integrated Validation Engine (DECEIVE): Let an LLM do all the hard honeypot work!☆245Updated this week
- Linux Security and Monitoring Scripts☆323Updated 7 months ago
- This repository contains Open Source freely usable Threat Intel feeds that can be used without additional requirements. Contains multiple…☆682Updated 4 months ago
- Map tracking ransomware, by OCD World Watch team☆469Updated 3 months ago
- Enterprise-ready SIEM, SOAR and Compliance powered by real-time correlation and threat intelligence.☆277Updated this week
- A standalone SIGMA-based detection tool for EVTX, Auditd and Sysmon for Linux logs☆717Updated 2 months ago
- A simple application that extracts your IoCs from garbage input and checks their reputation using multiple CTI services.☆417Updated this week