☆53Mar 4, 2019Updated 7 years ago
Alternatives and similar repositories for detection-sources
Users that are interested in detection-sources are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Matt's DFIR blog☆14Jul 28, 2025Updated 9 months ago
- ☆11Jun 11, 2025Updated 10 months ago
- A Splunk App containing Sigma detection rules, which can be updated from a Git repository.☆111Feb 6, 2020Updated 6 years ago
- Pcaps for PeddleCheap and implant communication + script for interpreting and decrypting pcaps.☆17Nov 29, 2017Updated 8 years ago
- ☆14Feb 8, 2020Updated 6 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Sysmon config for both Windows and Linux Devices. Windows one is a bit dated☆55Jul 10, 2024Updated last year
- Threat Alert Logic Repository☆93Feb 7, 2019Updated 7 years ago
- ☆350Mar 19, 2021Updated 5 years ago
- A collection of Cortex Analyzers and Responders for TheHive/Cortex☆13Jan 29, 2020Updated 6 years ago
- incident response scripts☆18Mar 4, 2019Updated 7 years ago
- A Splunk app mapped to MITRE ATT&CK to guide your threat hunts☆1,182Jul 26, 2023Updated 2 years ago
- Actionable analytics designed to combat threats☆1,009May 25, 2022Updated 3 years ago
- A datasource assessment on an event level to show potential coverage or the MITRE ATT&CK framework☆357Nov 3, 2020Updated 5 years ago
- Hunt for Keywords , Mutex, Windows Event,Registry Keys,Process,Schedule tasks in Windows Machine☆22Dec 8, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A collection of notebooks built for defensive and offensive operations.☆77Oct 13, 2020Updated 5 years ago
- An npm package to defang and refang IoC☆13Apr 11, 2026Updated 3 weeks ago
- Please see other maintained fork:☆17Dec 4, 2025Updated 5 months ago
- A repository of Sysmon For Linux configuration modules☆16Oct 14, 2021Updated 4 years ago
- InvestigationPlaybookSpec☆71Sep 26, 2017Updated 8 years ago
- certstream + analytics☆11Jan 17, 2020Updated 6 years ago
- Re-play Security Events☆1,746Mar 20, 2024Updated 2 years ago
- Tools to rapidly deploy a threat hunting capability on Azure Sentinel that leverages Sysmon and MITRE ATT&CK☆1,076Nov 28, 2024Updated last year
- Investigate suspicious activity by visualizing Sysmon's event log☆431Dec 22, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- OSSEM Modular☆27Jun 29, 2020Updated 5 years ago
- Cybersecurity Incidents Mind Maps☆34Sep 29, 2021Updated 4 years ago
- ☆168Jan 20, 2021Updated 5 years ago
- This repository is a curated list of pro bono incident response entities.☆21Jun 21, 2023Updated 2 years ago
- Splunk Technology Add-On (TA) for collecting ETW events from Windows systems☆16Dec 8, 2022Updated 3 years ago
- A PowerShell script to interact with the MITRE ATT&CK Framework via its own API☆370Feb 7, 2019Updated 7 years ago
- Windows Events Attack Samples☆2,554Jan 24, 2023Updated 3 years ago
- OSSEM Data Dictionaries☆65Jan 22, 2025Updated last year
- ☆11Apr 15, 2020Updated 6 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Sep 17, 2019Updated 6 years ago
- All sysmon event types and their fields explained☆567Nov 13, 2021Updated 4 years ago
- Malformed Access Log to CSV - Convert Web Server Access Logs to CSV☆18Sep 3, 2024Updated last year
- Notebooks created to attack and secure Active Directory environments☆27Nov 18, 2019Updated 6 years ago
- Personal compilation of APT malware from whitepaper releases, documents and own research☆266Feb 7, 2019Updated 7 years ago
- Automated Use Case Testing☆171May 1, 2018Updated 8 years ago
- A running list of Windows sources and the related event ids.☆19Aug 2, 2023Updated 2 years ago