Built-in Panther detection rules and policies
☆448May 1, 2026Updated last week
Alternatives and similar repositories for panther-analysis
Users that are interested in panther-analysis are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Command line tool for working with Panther rules and policies☆48Updated this week
- Collection of example YARA-L rules for use within Google Security Operations☆489Apr 20, 2026Updated 2 weeks ago
- Cloud security tutorials and best practices☆38Mar 20, 2023Updated 3 years ago
- [DEPRECATED] 🐯 Composable react primitives for building UI dashboards☆21Jan 17, 2023Updated 3 years ago
- ☆2,571Updated this week
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Detection Engineering is a tactical function of a cybersecurity defense program that involves the design, implementation, and operation o…☆1,189Apr 30, 2026Updated last week
- Open source security data lake for threat hunting, detection & response, and cybersecurity analytics at petabyte scale on AWS☆1,671Jan 8, 2025Updated last year
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.☆339Updated this week
- pocket guide for core detection engineering concepts☆31May 8, 2023Updated 3 years ago
- ☆376Feb 23, 2024Updated 2 years ago
- Splunk Security Content☆1,622Updated this week
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆61Mar 12, 2022Updated 4 years ago
- ✨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The …☆291Feb 5, 2024Updated 2 years ago
- An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and secur…☆175Mar 11, 2026Updated last month
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Main Sigma Rule Repository☆10,386May 1, 2026Updated last week
- ☆194Apr 22, 2026Updated 2 weeks ago
- Granular, Actionable Adversary Emulation for the Cloud☆2,315Updated this week
- Anvilogic Forge☆118Mar 31, 2026Updated last month
- Automated Attack Simulation in the Cloud, complete with detection use cases.☆613Nov 28, 2024Updated last year
- Convert cloudtrail data to MITRE ATT&CK Sightings☆82Jul 25, 2022Updated 3 years ago
- A framework for developing alerting and detection strategies for incident response.☆872Sep 8, 2025Updated 8 months ago
- Sublime rules for email attack detection, prevention, and threat hunting.☆361Updated this week
- Detect Tactics, Techniques & Combat Threats☆2,287Apr 29, 2026Updated last week
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Mapping the MITRE ATT&CK Matrix with Osquery☆811May 11, 2023Updated 2 years ago
- A repository of my own Sigma detection rules.☆165Nov 25, 2025Updated 5 months ago
- Save toil in security operations with: Detection & Intelligence Analysis for New Alerts (D.I.A.N.A. )☆223Sep 4, 2024Updated last year
- Hunting queries and detections☆901Oct 30, 2025Updated 6 months ago
- A MITRE ATT&CK Navigator export for AWS GuardDuty Findings☆138Jul 23, 2021Updated 4 years ago
- A public collection of detections designed to detect threats associated with the Okta WIC Platform.☆23Apr 30, 2026Updated last week
- Production-ready detection & response queries for osquery☆603Apr 22, 2026Updated 2 weeks ago
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆209Jul 21, 2022Updated 3 years ago
- ☆99Sep 16, 2022Updated 3 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Threat Detection & Anomaly Detection rules for popular open-source components☆53Jul 27, 2022Updated 3 years ago
- A knowledge base of actionable Incident Response techniques☆665May 31, 2022Updated 3 years ago
- OCSF Schema☆822May 1, 2026Updated last week
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,544Jan 12, 2026Updated 3 months ago
- Harness the security superpowers of your cloud asset inventory☆11Sep 22, 2024Updated last year
- Repository for threat hunting and detection queries, etc. for Defender for Endpoint and Microsoft Sentinel in KQL(Kusto Query Language).☆812Jan 14, 2026Updated 3 months ago
- A repository of curated datasets from various attacks☆765Updated this week