Kestrel threat hunting language: building reusable, composable, and shareable huntflows across different data sources and threat intel.
☆324Sep 27, 2024Updated last year
Alternatives and similar repositories for kestrel-lang
Users that are interested in kestrel-lang are comparing it to the libraries listed below
Sorting:
- This repository hosts community contributed Kestrel huntflows (.hf) and huntbooks (.ipynb)☆37Jan 2, 2024Updated 2 years ago
- This project consists of an open source library allowing software to connect to data repositories using STIX Patterning, and return resul…☆261Feb 27, 2026Updated last week
- This repository hosts community contributed Kestrel analytics☆18May 28, 2024Updated last year
- Firepit - STIX Columnar Storage☆18Jun 5, 2024Updated last year
- OCA-wide documentation shared by all sub-projects and repositories☆33Oct 31, 2024Updated last year
- Repository for threat hunting and detection queries, etc. for Defender for Endpoint and Microsoft Sentinel in KQL(Kusto Query Language).☆804Jan 14, 2026Updated last month
- Open Source Security Events Metadata (OSSEM)☆1,288Feb 27, 2023Updated 3 years ago
- Posture Attribute Collection and Evaluation☆23Jun 20, 2023Updated 2 years ago
- Augmentation to Machine Readable CTI☆37Sep 9, 2025Updated 5 months ago
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆208Jul 21, 2022Updated 3 years ago
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆154Apr 25, 2022Updated 3 years ago
- Actionable analytics designed to combat threats☆1,005May 25, 2022Updated 3 years ago
- Kestrel Jupyter Notebook Kernel☆10Oct 19, 2023Updated 2 years ago
- Re-play Security Events☆1,725Mar 20, 2024Updated last year
- A Splunk app mapped to MITRE ATT&CK to guide your threat hunts☆1,174Jul 26, 2023Updated 2 years ago
- Detect Tactics, Techniques & Combat Threats☆2,264Jan 21, 2026Updated last month
- Detection Ideas & Rules repository.☆178Sep 10, 2021Updated 4 years ago
- Microsoft Threat Intelligence Security Tools☆1,948Feb 10, 2026Updated 3 weeks ago
- Detection Engineering is a tactical function of a cybersecurity defense program that involves the design, implementation, and operation o…☆1,142Dec 19, 2025Updated 2 months ago
- A standalone SIGMA-based detection tool for EVTX, Auditd and Sysmon for Linux logs☆786Feb 22, 2026Updated last week
- OSSEM Detection Model☆183Oct 11, 2022Updated 3 years ago
- SysFlow documentation and issues tracker☆46Sep 30, 2024Updated last year
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,492Jan 12, 2026Updated last month
- Collection of example YARA-L rules for use within Google Security Operations☆473Dec 5, 2025Updated 3 months ago
- Sighting DB is designed to scale writing and reading a count of attributes, tracking when if was first and last seen☆17Apr 11, 2024Updated last year
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,515Jan 12, 2026Updated last month
- A Python library to help with some common threat hunting data analysis operations☆142Apr 23, 2023Updated 2 years ago
- Set of EVTX samples (>270) mapped to MITRE ATT&CK tactic and techniques to measure your SIEM coverage or developed new use cases.☆612Dec 8, 2025Updated 2 months ago
- TRAM is an open-source platform designed to advance research into automating the mapping of cyber threat intelligence reports to MITRE AT…☆551May 6, 2025Updated 10 months ago
- Automated handling of data feeds for security teams☆147Dec 31, 2025Updated 2 months ago
- A set of Zeek scripts to detect ATT&CK techniques.☆621Jun 26, 2024Updated last year
- Attack Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by devel…☆719Nov 14, 2025Updated 3 months ago
- Open-source framework to detect outliers in Elasticsearch events☆205May 22, 2023Updated 2 years ago
- Synapse Central Intelligence System☆435Updated this week
- Windows Events Attack Samples☆2,517Jan 24, 2023Updated 3 years ago
- OCSF Schema☆790Feb 27, 2026Updated last week
- Your Everyday Threat Intelligence☆1,954Feb 12, 2026Updated 3 weeks ago
- Main Sigma Rule Repository☆10,156Updated this week
- A standard for reducing log volume without sacrificing analytical capability☆214Feb 21, 2025Updated last year