Oriana is a threat hunting tool that leverages a subset of Windows events to build relationships, calculate totals and run analytics. The results are presented in a Web layer to help defenders identify outliers and suspicious behavior on corporate environments.
☆174Jun 10, 2021Updated 4 years ago
Alternatives and similar repositories for Oriana
Users that are interested in Oriana are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- attack2jira automates the process of standing up a Jira environment that can be used to track and measure ATT&CK coverage☆115Mar 26, 2023Updated 3 years ago
- Resource links (video, slides & code) for my conference talks | presentations | workshops☆21Nov 17, 2025Updated 5 months ago
- Sources, configuration and how to detect evil things utilizing Microsoft Sysmon.☆939Dec 12, 2023Updated 2 years ago
- PurpleSpray is an adversary simulation tool that executes password spray behavior under different scenarios and conditions with the purpo…☆51Aug 15, 2019Updated 6 years ago
- Checks observables/ioc in TheHive/Cortex against the MISP warningslists☆14Dec 27, 2017Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,317Jan 22, 2025Updated last year
- Powershell Threat Hunting Module☆291Sep 21, 2016Updated 9 years ago
- ☆350Mar 19, 2021Updated 5 years ago
- Investigate suspicious activity by visualizing Sysmon's event log☆431Dec 22, 2023Updated 2 years ago
- 16,432 Free Yara rules created by☆388Jun 1, 2019Updated 6 years ago
- Collect, Process, and Hunt with host based data from MacOS, Windows, and Linux☆507Oct 21, 2022Updated 3 years ago
- PurpleSharp is a C# adversary simulation tool that executes adversary techniques with the purpose of generating attack telemetry in monit…☆846Feb 23, 2026Updated 2 months ago
- Test Blue Team detections without running any attack.☆272May 2, 2024Updated 2 years ago
- An information security preparedness tool to do adversarial simulation.☆1,138Apr 1, 2019Updated 7 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Utilities for MITRE™ ATT&CK☆1,051Jan 3, 2026Updated 4 months ago
- The Cold Disk Quick Response (CDQR) tool is a fast and easy to use forensic artifact parsing tool that works on disk images, mounted driv…☆343Jun 25, 2022Updated 3 years ago
- A Splunk app mapped to MITRE ATT&CK to guide your threat hunts☆1,182Jul 26, 2023Updated 2 years ago
- Searches For Threat Hunting and Security Analytics☆239Mar 26, 2025Updated last year
- ☆1,093May 1, 2019Updated 7 years ago
- Python script to decode common encoded PowerShell scripts☆216Jun 13, 2018Updated 7 years ago
- A toolset to make a system look as if it was the victim of an APT attack☆2,739Sep 23, 2025Updated 7 months ago
- "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security …☆1,035May 27, 2020Updated 5 years ago
- Beagle is an incident response and digital forensics tool which transforms security logs and data into graphs.☆1,345Dec 13, 2022Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Open Source Security Events Metadata (OSSEM)☆1,293Feb 27, 2023Updated 3 years ago
- Old home of LimaCharlie, open source EDR☆32Sep 4, 2023Updated 2 years ago
- Remote Recon and Collection☆460Nov 23, 2017Updated 8 years ago
- CASCADE Server☆273Dec 8, 2022Updated 3 years ago
- Detect possible sysmon logging bypasses given a specific configuration☆111Dec 26, 2018Updated 7 years ago
- ATT&CK Remote Threat Hunting Incident Response☆204Dec 8, 2024Updated last year
- Active Directory Purple Team Playbook☆116May 8, 2023Updated 3 years ago
- Information about most important hunts which can be performed by Threat hunters while searching for any adversary/threats inside the orga…☆15May 18, 2019Updated 6 years ago
- Fast Incident Response☆2,007Apr 30, 2026Updated last week
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Check IOC provided by a MISP instance on Suricata events☆18Jun 4, 2019Updated 6 years ago
- This repository is a curated list of pro bono incident response entities.☆21Jun 21, 2023Updated 2 years ago
- Imaginary C2 is a python tool which aims to help in the behavioral (network) analysis of malware. Imaginary C2 hosts a HTTP server which …☆448Oct 26, 2022Updated 3 years ago
- Main Build directory☆179May 1, 2019Updated 7 years ago
- Investigate malicious Windows logon by visualizing and analyzing Windows event log☆3,171Apr 22, 2026Updated 2 weeks ago
- An informational repo about hunting for adversaries in your IT environment.☆1,864Nov 17, 2021Updated 4 years ago
- ☆98Feb 21, 2019Updated 7 years ago