kunai-project / kunaiLinks
Threat-hunting tool for Linux
☆925Updated 2 weeks ago
Alternatives and similar repositories for kunai
Users that are interested in kunai are comparing it to the libraries listed below
Sorting:
- Deep Linux runtime visibility meets Wireshark☆291Updated last week
- Open Adversary Exposure Validation Platform☆1,051Updated this week
- MasterParser is a powerful DFIR tool designed for analyzing and parsing Linux logs☆731Updated 2 months ago
- BLint is a Binary Linter to check the security properties, and capabilities in your executables. Since v2, blint is also an SBOM generato…☆380Updated last week
- Bitor Scanning Software☆383Updated last month
- Streamline vulnerability patching with CVSS, EPSS, and CISA's Known Exploited Vulnerabilities. Prioritize actions based on real-time thre…☆651Updated 2 months ago
- Transform Linux Audit logs for SIEM usage☆773Updated last month
- A rewrite of YARA in Rust.☆802Updated last week
- Vulnerability-Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streaml…☆318Updated this week
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆310Updated last week
- Pen Test Report Generation and Assessment Collaboration☆531Updated this week
- PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection…☆698Updated last week
- ☆261Updated 7 months ago
- A repo to conduct vulnerability enrichment.☆646Updated this week
- A centralized and enhanced memory analysis platform☆464Updated last month
- Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.☆2,679Updated last week
- The useful exploit finder☆814Updated last year
- DECeption with Evaluative Integrated Validation Engine (DECEIVE): Let an LLM do all the hard honeypot work!☆257Updated last week
- A resource containing all the tools each ransomware gangs uses☆1,055Updated 3 weeks ago
- Sysmon for Linux☆1,902Updated last month
- Collaborative Incident Response platform☆1,208Updated this week
- BlueHound - pinpoint the security issues that actually matter☆738Updated last year
- Advanced Wazuh Rules for more accurate threat detection. Feel free to implement within your own Wazuh environment, contribute, or fork!☆771Updated 2 weeks ago
- UAC is a powerful and extensible incident response tool designed for forensic investigators, security analysts, and IT professionals. It …☆1,000Updated this week
- This project aims to compare and evaluate the telemetry of various EDR products.☆1,810Updated 2 weeks ago
- An offensive data enrichment pipeline☆733Updated last week
- This repository contains Open Source freely usable Threat Intel feeds that can be used without additional requirements. Contains multiple…☆689Updated 4 months ago
- Logging Made Easy (LME) is a no cost, open source platform that centralizes log collection, enhances threat detection, and enables real-t…☆1,058Updated this week
- Customizable Linux Persistence Tool for Security Research and Detection Engineering.☆669Updated 3 months ago
- Production-ready detection & response queries for osquery☆574Updated last week