kunai-project / kunaiLinks
Threat-hunting tool for Linux
☆1,030Updated 2 months ago
Alternatives and similar repositories for kunai
Users that are interested in kunai are comparing it to the libraries listed below
Sorting:
- Deep Linux runtime visibility meets Wireshark☆300Updated 2 months ago
- A scalable file analysis and data generation platform that allows users to easily orchestrate arbitrary docker/vm/shell tools at scale.☆972Updated 2 weeks ago
- MasterParser is a powerful DFIR tool designed for analyzing and parsing Linux logs☆749Updated 5 months ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆501Updated 3 weeks ago
- A rewrite of YARA in Rust.☆991Updated last week
- blint is a Binary Linter that checks the security properties and capabilities of your executables. It can also generate a Software Bill-o…☆429Updated last month
- Open Adversarial Exposure Validation Platform☆1,583Updated last week
- Vulnerability-Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streaml…☆433Updated this week
- Transform Linux Audit logs for SIEM usage☆809Updated last month
- UAC is a powerful and extensible incident response tool designed for forensic investigators, security analysts, and IT professionals. It …☆1,227Updated this week
- Dissect is a digital forensics & incident response framework and toolset that allows you to quickly access and analyse forensic artefacts…☆1,056Updated last month
- A centralized and enhanced memory analysis platform☆511Updated 6 months ago
- A simple application that extracts your IoCs from garbage input and checks their reputation using multiple CTI services.☆489Updated this week
- A simple-to-use IR (incident response) case management tool for tracking and documenting investigations.☆433Updated 3 months ago
- DECeption with Evaluative Integrated Validation Engine (DECEIVE): Let an LLM do all the hard honeypot work!☆272Updated 7 months ago
- Streamline vulnerability patching with CVSS, EPSS, and CISA's Known Exploited Vulnerabilities. Prioritize actions based on real-time thre…☆682Updated 2 weeks ago
- Enterprise-ready SIEM, SOAR and Compliance powered by real-time correlation and threat intelligence.☆519Updated this week
- 🐍 High-performance, multi-threaded YARA & IOC scanner☆229Updated this week
- Customizable Linux Persistence Tool for Security Research and Detection Engineering.☆834Updated 10 months ago
- Collaborative Incident Response platform☆1,362Updated last week
- A website and framework for testing NIDS detection☆311Updated 6 months ago
- Galah: An LLM-powered web honeypot.☆630Updated 5 months ago
- ⚡️ Catalyst is a self-hosted, open source incident response platform and ticket system that helps to automate alert handling and incident…☆502Updated last week
- Linux Security and Monitoring Scripts☆327Updated 3 months ago
- A modular vulnerability scanner with automatic report generation capabilities.☆1,105Updated this week
- SOCFortress CoPilot☆427Updated this week
- Sysmon for Linux☆2,054Updated 6 months ago
- SharpEye: Advanced Linux Intrusion Detection and Threat Hunting System☆169Updated last month
- Pen Test Report Generation and Assessment Collaboration☆586Updated last month
- Bitor Scanning Software☆439Updated 2 months ago