Kestrel threat hunting language: building reusable, composable, and shareable huntflows across different data sources and threat intel.
☆325Sep 27, 2024Updated last year
Alternatives and similar repositories for kestrel-lang
Users that are interested in kestrel-lang are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This repository hosts community contributed Kestrel huntflows (.hf) and huntbooks (.ipynb)☆37Jan 2, 2024Updated 2 years ago
- This project consists of an open source library allowing software to connect to data repositories using STIX Patterning, and return resul…☆261Mar 16, 2026Updated last week
- This repository hosts community contributed Kestrel analytics☆18May 28, 2024Updated last year
- Firepit - STIX Columnar Storage☆18Jun 5, 2024Updated last year
- OCA-wide documentation shared by all sub-projects and repositories☆33Oct 31, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Kestrel Jupyter Notebook Kernel☆10Oct 19, 2023Updated 2 years ago
- Posture Attribute Collection and Evaluation☆23Jun 20, 2023Updated 2 years ago
- Repository for threat hunting and detection queries, etc. for Defender for Endpoint and Microsoft Sentinel in KQL(Kusto Query Language).☆806Jan 14, 2026Updated 2 months ago
- Open Source Security Events Metadata (OSSEM)☆1,289Feb 27, 2023Updated 3 years ago
- Augmentation to Machine Readable CTI☆37Sep 9, 2025Updated 6 months ago
- Detection Ideas & Rules repository.☆178Sep 10, 2021Updated 4 years ago
- Re-play Security Events☆1,729Mar 20, 2024Updated 2 years ago
- SysFlow collection probe☆17Nov 11, 2025Updated 4 months ago
- Actionable analytics designed to combat threats☆1,005May 25, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- SysFlow documentation and issues tracker☆46Sep 30, 2024Updated last year
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆209Jul 21, 2022Updated 3 years ago
- A Splunk app mapped to MITRE ATT&CK to guide your threat hunts☆1,175Jul 26, 2023Updated 2 years ago
- Detect Tactics, Techniques & Combat Threats☆2,269Jan 21, 2026Updated 2 months ago
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆154Apr 25, 2022Updated 3 years ago
- Microsoft Threat Intelligence Security Tools☆1,955Mar 6, 2026Updated 2 weeks ago
- Detection Engineering is a tactical function of a cybersecurity defense program that involves the design, implementation, and operation o…☆1,155Dec 19, 2025Updated 3 months ago
- STIX 2 Fake Data Generator☆11Oct 17, 2024Updated last year
- A standalone SIGMA-based detection tool for EVTX, Auditd and Sysmon for Linux logs☆794Updated this week
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A Python library to help with some common threat hunting data analysis operations☆142Apr 23, 2023Updated 2 years ago
- A script to create and assign SOP tasks into the cases☆20Aug 16, 2020Updated 5 years ago
- Main Sigma Rule Repository☆10,224Mar 19, 2026Updated last week
- OSSEM Detection Model☆184Oct 11, 2022Updated 3 years ago
- OCSF Schema☆801Mar 18, 2026Updated last week
- Sighting DB is designed to scale writing and reading a count of attributes, tracking when if was first and last seen☆17Apr 11, 2024Updated last year
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,508Jan 12, 2026Updated 2 months ago
- An open-source command-line tool for cybersecurity reporting automation and a configuration language for reusable templates. Reporting-as…☆67Jul 6, 2025Updated 8 months ago
- Windows Events Attack Samples☆2,531Jan 24, 2023Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,516Jan 12, 2026Updated 2 months ago
- ☆102Nov 26, 2020Updated 5 years ago
- Collection of Jupyter Notebook for Threat Hunting and Blue Team Purposes☆22Jun 15, 2022Updated 3 years ago
- TRAM is an open-source platform designed to advance research into automating the mapping of cyber threat intelligence reports to MITRE AT…☆555May 6, 2025Updated 10 months ago
- Sublime rules for email attack detection, prevention, and threat hunting.☆352Mar 20, 2026Updated last week
- Your Everyday Threat Intelligence☆1,962Updated this week
- This content is analysis and research of the data sources currently listed in ATT&CK.☆413Sep 13, 2023Updated 2 years ago