Detection intelligence turbocharged with Al.
☆512Mar 3, 2026Updated last month
Alternatives and similar repositories for detectflow-main
Users that are interested in detectflow-main are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A framework and taxonomy for identifying, classifying, and reasoning about detection logic bugs in SIEM, EDR, and XDR rules, with concret…☆48Mar 5, 2026Updated last month
- CVE-2025-55182-bypass-waf☆31Jan 8, 2026Updated 3 months ago
- Simple script to generate commands to achieve reverse shells.☆12Aug 12, 2019Updated 6 years ago
- Generates a detailed CSV file containing Sigma Rules statistics for each service or category, and each level, offering a holistic view of…☆10Dec 22, 2023Updated 2 years ago
- ☆56Dec 13, 2025Updated 4 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- MCP to help Defenders Detection Engineer Harder and Smarter☆382Apr 7, 2026Updated last week
- Workflows for Shuffle☆24Oct 26, 2022Updated 3 years ago
- Custom semgrep rules registry☆14Aug 23, 2022Updated 3 years ago
- 🔭 Open-source trace viewer for OpenTelemetry. Beautiful UI, real-time updates, runs locally. Your session debugger for distributed syste…☆54Apr 2, 2026Updated last week
- CTI Expert — Cyber Threat Intelligence & OSINT analysis skill for Claude Code. 67+ commands, 35 techniques, no API keys required.☆61Updated this week
- Invictus Threat Intelligence: IOCs and TTPs from blogs, research and more☆30Mar 31, 2026Updated 2 weeks ago
- ☆13May 16, 2019Updated 6 years ago
- Searches for Insider Threat Hunting☆30May 2, 2019Updated 6 years ago
- Network monitoring tool that maps process-to-network connections, identifies cloud providers, and detects beaconing activity. Zero-flag a…☆107Feb 26, 2026Updated last month
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Bulk turn on Analytic rules in Azure Sentinel☆19Oct 7, 2021Updated 4 years ago
- Follow the trail of breadcrumbs left behind by any user on a computer or mounted disk image.☆32Aug 28, 2025Updated 7 months ago
- ☆13Feb 6, 2018Updated 8 years ago
- Analyze Zeek IDS data with ksqlDB running on Confluent Platform via Docker on your laptop. Or spin up an arbitrary number of AWS hosts, …☆11Sep 30, 2021Updated 4 years ago
- A web security research tool for DOM testing☆24Feb 7, 2026Updated 2 months ago
- This program will take encrypted shell code and decrypt it in run time and inject it into another process☆29Mar 24, 2022Updated 4 years ago
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆63Updated this week
- Python script to automatically create sigma rules from The hive observables☆25Mar 17, 2019Updated 7 years ago
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆103Mar 21, 2026Updated 3 weeks ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- 🛡️ SIGMA Detection Engineering Platform A comprehensive AI-powered detection engineering platform for security teams to explore MITRE AT…☆45Jun 28, 2025Updated 9 months ago
- Know Your IP: Get location, blacklist status, shodan and censys results, and more.☆21Dec 15, 2025Updated 3 months ago
- ☆12Feb 15, 2024Updated 2 years ago
- [ICCV 2025] HouseTour: A Virtual Real Estate A(I)gent☆38Oct 22, 2025Updated 5 months ago
- Dark Light Viewer - a tool to conduct change detection over time using VIIRS night lights data.☆42Mar 3, 2026Updated last month
- SecuritySnack data that doesn't fit into a single tweet.☆45Feb 26, 2026Updated last month
- Cyber Threats Detection Rules☆14Sep 16, 2025Updated 6 months ago
- Information about most important hunts which can be performed by Threat hunters while searching for any adversary/threats inside the orga…☆15May 18, 2019Updated 6 years ago
- SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty☆18Feb 9, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Windows / Linux Local Privilege Escalation Workshop☆11Jan 15, 2019Updated 7 years ago
- Handling Big Data with Knowledge Graph: A Detailed Guide☆30May 11, 2025Updated 11 months ago
- A voice-activated AI assistant modeled after HAL 9000, built with Raspberry Pi and self-hosted services for speech-to-text, language gene…☆60Apr 17, 2025Updated 11 months ago
- TheGradientPath is your hands-on guide to ML and AI, mixing bite-sized Python scripts, notebooks, and videos. Start with fundamentals, cl…☆74Feb 8, 2026Updated 2 months ago
- AI-powered vulnerability scanner extension for Burp Suite with multi-provider support (Ollama, OpenAI, Claude, Gemini)☆270Mar 19, 2026Updated 3 weeks ago
- ☆36Feb 1, 2026Updated 2 months ago
- ProxyWatch☆48Apr 3, 2026Updated last week