sgInnora / sharpeyeLinks
SharpEye: Advanced Linux Intrusion Detection and Threat Hunting System
☆76Updated last week
Alternatives and similar repositories for sharpeye
Users that are interested in sharpeye are comparing it to the libraries listed below
Sorting:
- LOLESXi is a curated compilation of binaries/scripts available in VMware ESXi that are were used to by adversaries in their intrusions. T…☆123Updated 4 months ago
- NoDelete is a tool that assists in malware analysis by locking a folder where malware drops files before deleting them.☆47Updated 5 months ago
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆195Updated 4 months ago
- Assortment of scripts and tools for our Blackhat EU 2024 talk☆93Updated 3 months ago
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆150Updated 8 months ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆124Updated last year
- A tool collection for filtering and visualizing logon events. Designed to help answering the "Cotton Eye Joe" question (Where did you com…☆171Updated last week
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆74Updated last month
- FJTA (Forensic Journal Timeline Analyzer) is a tool that analyzes Linux filesystem (EXT4, XFS) journals (not systemd-journald), generates…☆64Updated 2 months ago
- Rapidly Search and Hunt through Linux Forensics Artifacts☆192Updated last year
- Repository for sharing examples of our artifacts data and for use in new analyst recruitment.☆99Updated last month
- ☆37Updated last year
- Free training course offered at Hack Space Con 2023☆138Updated 2 years ago
- Analyze pcaps with Zeek and a Grafana Dashboard☆177Updated last year
- God Mode Detection Rules☆134Updated 9 months ago
- PowerShell Script Analyzer☆68Updated last year
- Mapping of open-source detection rules and atomic tests.☆166Updated 4 months ago
- A collection of CVEs weaponized by ransomware operators☆115Updated last week
- Have you ever wanted to search a link or IP address on multiple OSINT pages at once?☆43Updated this week
- Online resources related to Detection Engineering. Detection rules, detection logic, attack samples, detection tests and emulation tools…☆94Updated last week
- Raw data from Threat Intelligence Reports with automatic reports collection and keyword search across thousands of reports☆119Updated this week
- Cyber threat intelligence tool suite.☆37Updated 2 months ago
- ☆63Updated this week
- An automated Breach and Attack Simulation lab with terraform. Built for IaC stability, consistency, and speed.☆190Updated 11 months ago
- ☆68Updated 4 months ago
- Repository that contains a set of purposefully erroneous Yara rules.☆51Updated last year
- Living Off Security Tools☆45Updated 7 months ago
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆155Updated 2 months ago
- Automation tool for Windows Deception Host Burn-In☆86Updated 6 months ago
- Persist like a Dodder☆61Updated 2 weeks ago