Detection intelligence turbocharged with Al.
☆502Mar 3, 2026Updated 3 weeks ago
Alternatives and similar repositories for detectflow-main
Users that are interested in detectflow-main are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CVE-2025-55182-bypass-waf☆31Jan 8, 2026Updated 2 months ago
- Mattermost is an open source platform for secure collaboration across the entire software development lifecycle..☆27Oct 20, 2025Updated 5 months ago
- Generates a detailed CSV file containing Sigma Rules statistics for each service or category, and each level, offering a holistic view of…☆10Dec 22, 2023Updated 2 years ago
- Protect your PHP project from deserialization attacks! As seen on NDSS 2024☆15Aug 8, 2025Updated 7 months ago
- MCP to help Defenders Detection Engineer Harder and Smarter☆340Mar 5, 2026Updated 2 weeks ago
- ☆56Dec 13, 2025Updated 3 months ago
- 🔭 Open-source trace viewer for OpenTelemetry. Beautiful UI, real-time updates, runs locally. Your session debugger for distributed syste…☆53Updated this week
- Custom semgrep rules registry☆14Aug 23, 2022Updated 3 years ago
- Invictus Threat Intelligence: IOCs and TTPs from blogs, research and more☆30Mar 10, 2026Updated 2 weeks ago
- ☆13May 16, 2019Updated 6 years ago
- Bulk turn on Analytic rules in Azure Sentinel☆19Oct 7, 2021Updated 4 years ago
- Follow the trail of breadcrumbs left behind by any user on a computer or mounted disk image.☆32Aug 28, 2025Updated 6 months ago
- ☆13Feb 6, 2018Updated 8 years ago
- A web security research tool for DOM testing☆24Feb 7, 2026Updated last month
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆62Updated this week
- Python script to automatically create sigma rules from The hive observables☆25Mar 17, 2019Updated 7 years ago
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆103Updated this week
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆43Sep 18, 2018Updated 7 years ago
- 🛡️ SIGMA Detection Engineering Platform A comprehensive AI-powered detection engineering platform for security teams to explore MITRE AT…☆45Jun 28, 2025Updated 8 months ago
- Modern, Fast & Reliable WhatsApp Gateway Built with Baileys x Antigravity☆86Jan 13, 2026Updated 2 months ago
- ☆12Feb 15, 2024Updated 2 years ago
- An OSINT tool for searching DuckDuckGo via Tor using search dorks.☆22May 3, 2025Updated 10 months ago
- [ICCV 2025] HouseTour: A Virtual Real Estate A(I)gent☆37Oct 22, 2025Updated 5 months ago
- AI-powered vulnerability scanner extension for Burp Suite with multi-provider support (Ollama, OpenAI, Claude, Gemini)☆221Updated this week
- SecuritySnack data that doesn't fit into a single tweet.☆45Feb 26, 2026Updated 3 weeks ago
- Handling Big Data with Knowledge Graph: A Detailed Guide☆29May 11, 2025Updated 10 months ago
- Cyber Threats Detection Rules☆14Sep 16, 2025Updated 6 months ago
- LAN Orangutan is a lightweight network scanner with persistent device labeling, multi-network support, and Tailscale integration. Built b…☆150Jan 16, 2026Updated 2 months ago
- Information about most important hunts which can be performed by Threat hunters while searching for any adversary/threats inside the orga…☆15May 18, 2019Updated 6 years ago
- S2AN - Mapper of Sigma/Suricata Rules/Signatures ➡️ MITRE ATT&CK Navigator☆91Dec 8, 2022Updated 3 years ago
- SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty☆18Feb 9, 2024Updated 2 years ago
- ☆19Sep 2, 2018Updated 7 years ago
- ☆51Feb 14, 2026Updated last month
- A voice-activated AI assistant modeled after HAL 9000, built with Raspberry Pi and self-hosted services for speech-to-text, language gene…☆53Apr 17, 2025Updated 11 months ago
- ProxyWatch☆46Feb 28, 2026Updated 3 weeks ago
- A tool to display Windows Event logs as they happen.☆14Sep 19, 2023Updated 2 years ago
- A Python script to discover AWS IAM identities (users and roles) with specified access to specified resources.☆14May 16, 2022Updated 3 years ago
- A framework and taxonomy for identifying, classifying, and reasoning about detection logic bugs in SIEM, EDR, and XDR rules, with concret…☆45Mar 5, 2026Updated 2 weeks ago
- Simple Web CLI Web UI Interface☆33Feb 1, 2026Updated last month