kunai-project / kunaiLinks
Threat-hunting tool for Linux
☆982Updated last month
Alternatives and similar repositories for kunai
Users that are interested in kunai are comparing it to the libraries listed below
Sorting:
- Deep Linux runtime visibility meets Wireshark☆293Updated 2 months ago
- A scalable file analysis and data generation platform that allows users to easily orchestrate arbitrary docker/vm/shell tools at scale.☆947Updated this week
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆388Updated last week
- MasterParser is a powerful DFIR tool designed for analyzing and parsing Linux logs☆742Updated last month
- Open Adversary Exposure Validation Platform☆1,401Updated this week
- A rewrite of YARA in Rust.☆886Updated this week
- BLint is a Binary Linter to check the security properties, and capabilities in your executables. Since v2, blint is also an SBOM generato…☆404Updated this week
- Vulnerability-Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streaml…☆377Updated this week
- A modular vulnerability scanner with automatic report generation capabilities.☆939Updated last week
- Transform Linux Audit logs for SIEM usage☆793Updated 2 weeks ago
- UAC is a powerful and extensible incident response tool designed for forensic investigators, security analysts, and IT professionals. It …☆1,143Updated last month
- Streamline vulnerability patching with CVSS, EPSS, and CISA's Known Exploited Vulnerabilities. Prioritize actions based on real-time thre…☆671Updated 2 months ago
- SOCFortress CoPilot☆366Updated last week
- A simple-to-use IR (incident response) case management tool for tracking and documenting investigations.☆380Updated this week
- Dissect is a digital forensics & incident response framework and toolset that allows you to quickly access and analyse forensic artefacts…☆1,041Updated last week
- Collaborative Incident Response platform☆1,282Updated last week
- Advanced Wazuh Rules for more accurate threat detection. Feel free to implement within your own Wazuh environment, contribute, or fork!☆1,103Updated last week
- ⚡️ Catalyst is a self-hosted, open source incident response platform and ticket system that helps to automate alert handling and incident…☆474Updated last week
- A centralized and enhanced memory analysis platform☆496Updated 2 months ago
- A repo to conduct vulnerability enrichment.☆685Updated this week
- A production ready Dockered MISP☆284Updated this week
- A simple application that extracts your IoCs from garbage input and checks their reputation using multiple CTI services.☆459Updated this week
- A website and framework for testing NIDS detection☆289Updated 2 months ago
- Galah: An LLM-powered web honeypot.☆588Updated 2 months ago
- PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection…☆714Updated last month
- AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE…☆1,184Updated this week
- DECeption with Evaluative Integrated Validation Engine (DECEIVE): Let an LLM do all the hard honeypot work!☆264Updated 3 months ago
- Enterprise-ready SIEM, SOAR and Compliance powered by real-time correlation and threat intelligence.☆328Updated this week
- Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.☆2,857Updated last week
- This repository contains Open Source freely usable Threat Intel feeds that can be used without additional requirements. Contains multiple…☆711Updated 8 months ago