shadawck / awesome-endpoint-detection-and-responseLinks
Collection of tool you need to have in your Endpoint Detection and Response arsenal
☆111Updated last year
Alternatives and similar repositories for awesome-endpoint-detection-and-response
Users that are interested in awesome-endpoint-detection-and-response are comparing it to the libraries listed below
Sorting:
- File analysis and management framework.☆92Updated 2 years ago
- A Self-Contained Open-Source Cyberattack Experimentation Testbed☆43Updated 7 months ago
- ☆33Updated 3 months ago
- Data visualization for blue teams☆126Updated 3 years ago
- yara detection rules for hunting with the threathunting-keywords project☆158Updated 8 months ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆66Updated 3 years ago
- Threat Intel Platform for T-POTs☆162Updated last week
- Cyber Threat Intelligence Data, Indicators, and Analysis☆107Updated last week
- ☆69Updated 4 years ago
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆87Updated 3 years ago
- OSSEM Data Dictionaries☆65Updated last year
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆119Updated 2 years ago
- QuickSand document and PDF malware analysis tool written in Python☆135Updated 2 months ago
- Enhance your malware detection with WAF + YARA (WAFARAY)☆108Updated 3 years ago
- MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.☆67Updated last year
- Memory Forensic System on Cloud☆92Updated 2 years ago
- A Ruleset to enhance detection capabilities of Ossec using Sysmon☆94Updated 3 years ago
- Roota is a public-domain language of threat detection and response that combines native queries from a SIEM, EDR, XDR, or Data Lake with …☆132Updated last year
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆105Updated 3 years ago
- How to setup a honeypot with an IDS, ELK and TLS traffic inspection☆164Updated 3 years ago
- Fast IOC and YARA Scanner☆88Updated 5 years ago
- YaraScanner is a file pattern-matching tool based on YARA rules.☆60Updated 2 years ago
- Rules Shared by the Community from 100 Days of YARA 2023☆78Updated 2 years ago
- A toolkit for the post-mortem examination of Docker containers from forensic HDD copies☆107Updated last year
- Open IOC sharing platform☆65Updated 3 weeks ago
- Entropy scanner for Linux to detect packed or encrypted binaries related to malware. Finds malicious files and Linux processes and gives …☆167Updated last year
- Convert Sigma rules to SIEM queries, directly in your browser.☆107Updated this week
- Lua plugin to extract data from Wireshark and convert it into MISP format☆49Updated 2 years ago
- OpenCTI–Wazuh connector looking for indicators in Wazuh and creating sightings☆22Updated last year
- Arya is a unique tool that produces pseudo-malicious files meant to trigger YARA rules. You can think of it like a reverse YARA.☆259Updated 3 years ago