opencybersecurityalliance / kestrel-langView external linksLinks
Kestrel threat hunting language: building reusable, composable, and shareable huntflows across different data sources and threat intel.
☆324Sep 27, 2024Updated last year
Alternatives and similar repositories for kestrel-lang
Users that are interested in kestrel-lang are comparing it to the libraries listed below
Sorting:
- This repository hosts community contributed Kestrel huntflows (.hf) and huntbooks (.ipynb)☆36Jan 2, 2024Updated 2 years ago
- This project consists of an open source library allowing software to connect to data repositories using STIX Patterning, and return resul…☆260Updated this week
- This repository hosts community contributed Kestrel analytics☆18May 28, 2024Updated last year
- Firepit - STIX Columnar Storage☆17Jun 5, 2024Updated last year
- OCA-wide documentation shared by all sub-projects and repositories☆33Oct 31, 2024Updated last year
- Repository for threat hunting and detection queries, etc. for Defender for Endpoint and Microsoft Sentinel in KQL(Kusto Query Language).☆801Jan 14, 2026Updated 3 weeks ago
- Open Source Security Events Metadata (OSSEM)☆1,287Feb 27, 2023Updated 2 years ago
- Posture Attribute Collection and Evaluation☆23Jun 20, 2023Updated 2 years ago
- Augmentation to Machine Readable CTI☆37Sep 9, 2025Updated 5 months ago
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆207Jul 21, 2022Updated 3 years ago
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆154Apr 25, 2022Updated 3 years ago
- Actionable analytics designed to combat threats☆1,006May 25, 2022Updated 3 years ago
- Kestrel Jupyter Notebook Kernel☆10Oct 19, 2023Updated 2 years ago
- Re-play Security Events☆1,723Mar 20, 2024Updated last year
- A Splunk app mapped to MITRE ATT&CK to guide your threat hunts☆1,173Jul 26, 2023Updated 2 years ago
- Detect Tactics, Techniques & Combat Threats☆2,263Jan 21, 2026Updated 3 weeks ago
- Detection Ideas & Rules repository.☆178Sep 10, 2021Updated 4 years ago
- Microsoft Threat Intelligence Security Tools☆1,940Updated this week
- Detection Engineering is a tactical function of a cybersecurity defense program that involves the design, implementation, and operation o…☆1,126Dec 19, 2025Updated last month
- A standalone SIGMA-based detection tool for EVTX, Auditd and Sysmon for Linux logs☆778Feb 6, 2026Updated last week
- OSSEM Detection Model☆184Oct 11, 2022Updated 3 years ago
- SysFlow documentation and issues tracker☆46Sep 30, 2024Updated last year
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,475Jan 12, 2026Updated last month
- Collection of example YARA-L rules for use within Google Security Operations☆471Dec 5, 2025Updated 2 months ago
- Sighting DB is designed to scale writing and reading a count of attributes, tracking when if was first and last seen☆17Apr 11, 2024Updated last year
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,514Jan 12, 2026Updated last month
- A Python library to help with some common threat hunting data analysis operations☆143Apr 23, 2023Updated 2 years ago
- TRAM is an open-source platform designed to advance research into automating the mapping of cyber threat intelligence reports to MITRE AT…☆545May 6, 2025Updated 9 months ago
- Set of EVTX samples (>270) mapped to MITRE ATT&CK tactic and techniques to measure your SIEM coverage or developed new use cases.☆613Dec 8, 2025Updated 2 months ago
- Automated handling of data feeds for security teams☆147Dec 31, 2025Updated last month
- A set of Zeek scripts to detect ATT&CK techniques.☆620Jun 26, 2024Updated last year
- Attack Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by devel…☆713Nov 14, 2025Updated 2 months ago
- Open-source framework to detect outliers in Elasticsearch events☆208May 22, 2023Updated 2 years ago
- Synapse Central Intelligence System☆434Updated this week
- Windows Events Attack Samples☆2,502Jan 24, 2023Updated 3 years ago
- OCSF Schema☆775Updated this week
- Your Everyday Threat Intelligence☆1,949Updated this week
- Main Sigma Rule Repository☆10,109Updated this week
- A standard for reducing log volume without sacrificing analytical capability☆214Feb 21, 2025Updated 11 months ago