Kestrel threat hunting language: building reusable, composable, and shareable huntflows across different data sources and threat intel.
☆327Sep 27, 2024Updated last year
Alternatives and similar repositories for kestrel-lang
Users that are interested in kestrel-lang are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This repository hosts community contributed Kestrel huntflows (.hf) and huntbooks (.ipynb)☆37Jan 2, 2024Updated 2 years ago
- This project consists of an open source library allowing software to connect to data repositories using STIX Patterning, and return resul…☆261Apr 8, 2026Updated 3 weeks ago
- This repository hosts community contributed Kestrel analytics☆18May 28, 2024Updated last year
- Firepit - STIX Columnar Storage☆18Jun 5, 2024Updated last year
- OCA-wide documentation shared by all sub-projects and repositories☆33Oct 31, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Kestrel Jupyter Notebook Kernel☆10Oct 19, 2023Updated 2 years ago
- Posture Attribute Collection and Evaluation☆23Jun 20, 2023Updated 2 years ago
- Repository for threat hunting and detection queries, etc. for Defender for Endpoint and Microsoft Sentinel in KQL(Kusto Query Language).☆812Jan 14, 2026Updated 3 months ago
- Open Source Security Events Metadata (OSSEM)☆1,293Feb 27, 2023Updated 3 years ago
- Augmentation to Machine Readable CTI☆38Apr 22, 2026Updated last week
- Detection Ideas & Rules repository.☆178Sep 10, 2021Updated 4 years ago
- Re-play Security Events☆1,746Mar 20, 2024Updated 2 years ago
- SysFlow collection probe☆17Nov 11, 2025Updated 5 months ago
- Actionable analytics designed to combat threats☆1,009May 25, 2022Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- SysFlow documentation and issues tracker☆46Sep 30, 2024Updated last year
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆209Jul 21, 2022Updated 3 years ago
- A Splunk app mapped to MITRE ATT&CK to guide your threat hunts☆1,182Jul 26, 2023Updated 2 years ago
- Detect Tactics, Techniques & Combat Threats☆2,286Apr 29, 2026Updated last week
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆154Apr 25, 2022Updated 4 years ago
- Microsoft Threat Intelligence Security Tools☆1,966Updated this week
- STIX 2 Fake Data Generator☆11Oct 17, 2024Updated last year
- Detection Engineering is a tactical function of a cybersecurity defense program that involves the design, implementation, and operation o…☆1,181Updated this week
- A standalone SIGMA-based detection tool for EVTX, Auditd and Sysmon for Linux logs☆806Apr 6, 2026Updated 3 weeks ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A Python library to help with some common threat hunting data analysis operations☆142Apr 23, 2023Updated 3 years ago
- A script to create and assign SOP tasks into the cases☆20Aug 16, 2020Updated 5 years ago
- Main Sigma Rule Repository☆10,386Updated this week
- OSSEM Detection Model☆184Oct 11, 2022Updated 3 years ago
- OCSF Schema☆822Updated this week
- Sighting DB is designed to scale writing and reading a count of attributes, tracking when if was first and last seen☆17Apr 11, 2024Updated 2 years ago
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,544Jan 12, 2026Updated 3 months ago
- An open-source command-line tool for cybersecurity reporting automation and a configuration language for reusable templates. Reporting-as…☆70Jul 6, 2025Updated 9 months ago
- Windows Events Attack Samples☆2,554Jan 24, 2023Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,511Jan 12, 2026Updated 3 months ago
- ☆101Nov 26, 2020Updated 5 years ago
- Collection of Jupyter Notebook for Threat Hunting and Blue Team Purposes☆22Jun 15, 2022Updated 3 years ago
- Sublime rules for email attack detection, prevention, and threat hunting.☆361Updated this week
- TRAM is an open-source platform designed to advance research into automating the mapping of cyber threat intelligence reports to MITRE AT…☆561May 6, 2025Updated 11 months ago
- Your Everyday Threat Intelligence☆1,977Apr 14, 2026Updated 3 weeks ago
- This content is analysis and research of the data sources currently listed in ATT&CK.☆413Sep 13, 2023Updated 2 years ago