shadawck / awesome-endpoint-detection-and-responseLinks
Collection of tool you need to have in your Endpoint Detection and Response arsenal
☆97Updated last year
Alternatives and similar repositories for awesome-endpoint-detection-and-response
Users that are interested in awesome-endpoint-detection-and-response are comparing it to the libraries listed below
Sorting:
- Small web frontend for using openAI's GPT-3.5 and GPT-4's API☆55Updated 3 months ago
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆115Updated last year
- Automation tool for Windows Deception Host Burn-In☆86Updated 7 months ago
- File analysis and management framework.☆88Updated last year
- A Self-Contained Open-Source Cyberattack Experimentation Testbed☆41Updated last month
- Cyber Threat Intelligence Data, Indicators, and Analysis☆90Updated 3 weeks ago
- yara detection rules for hunting with the threathunting-keywords project☆124Updated 2 months ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆64Updated 2 years ago
- ☆38Updated 3 months ago
- Rules Shared by the Community from 100 Days of YARA 2023☆77Updated 2 years ago
- YaraScanner is a file pattern-matching tool based on YARA rules.☆57Updated 2 years ago
- Repository of tools and resources for analyzing Docker containers☆66Updated last year
- Elastic Security Labs releases☆75Updated last week
- pySigma Elasticsearch backend☆55Updated this week
- ☆80Updated 2 years ago
- Enhance your malware detection with WAF + YARA (WAFARAY)☆109Updated 2 years ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆105Updated 3 years ago
- Graphical map of known Advanced Persistent Threats☆54Updated 3 months ago
- LOKI2 - Simple IOC and YARA Scanner☆95Updated last week
- Source code used at TweetFeed.live☆43Updated 2 years ago
- Data visualization for blue teams☆126Updated 2 years ago
- Rapid7 Labs operates as the division of Rapid7 focused on threat research. It is renowned for providing comprehensive threat intelligence…☆67Updated last month
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆86Updated 3 years ago
- This script enhances endpoint logging telemetry for the purpose of advanced malware threat detection or for building detections or malwar…☆31Updated 3 months ago
- ☆33Updated this week
- BlueBox Malware analysis Box and Cyber threat intelligence.☆42Updated 3 years ago
- Entropy scanner for Linux to detect packed or encrypted binaries related to malware. Finds malicious files and Linux processes and gives …☆158Updated last year
- Collection of rules created using YARA-Signator over Malpedia☆131Updated 8 months ago
- Open IOC sharing platform☆55Updated 8 months ago
- How to setup a honeypot with an IDS, ELK and TLS traffic inspection☆158Updated 3 years ago