Synthetic Adversarial Log Objects: A Framework for synthentic log generation
☆88Jan 11, 2024Updated 2 years ago
Alternatives and similar repositories for salo
Users that are interested in salo are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Collects a listing of MITRE ATT&CK Techniques, then discovers Splunk ESCU detections for each technique☆69Mar 17, 2024Updated 2 years ago
- Carbon Black TAU Excel 4 Macro Analysis☆44Feb 8, 2024Updated 2 years ago
- GoldenSAML Attack Libraries and Framework☆77Jun 5, 2024Updated last year
- A tool that allows you to create vulnerable instrumented local or cloud environments to simulate attacks against and collect the data int…☆2,467Updated this week
- Cumulonimbus-UAL_Extractor is a PowerShell based tool created by the Tesorion CERT team to help gather the Unified Audit Logging out of a…☆21Oct 25, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆120Jun 2, 2021Updated 4 years ago
- Low budget VirusTotal Intelligence Cosplay☆20Jan 6, 2022Updated 4 years ago
- Python 3 library to build YARA rules.☆13Oct 24, 2021Updated 4 years ago
- Accelerating the collection, processing, analysis and outputting of digital forensic artefacts.☆32Nov 23, 2025Updated 4 months ago
- intelligence-icons is a collection of icons and diagrams for building training and marketing materials around Intelligence sharing; inclu…☆41Mar 17, 2019Updated 7 years ago
- Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. The research…☆57Mar 2, 2026Updated last month
- An extension of the sigma standard to include security metrics.☆16May 18, 2023Updated 2 years ago
- D4 core software (server and sample sensor client)☆43Dec 23, 2023Updated 2 years ago
- External twitter feeder for AIL framework☆16Apr 16, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Repo containing docker-compose files and setup scripts without having to clone the individual reternal components☆111Mar 25, 2021Updated 5 years ago
- Automatic detection engineering technical state compliance☆55Jul 7, 2024Updated last year
- Build Automated Machine Images for MISP☆29Jun 9, 2023Updated 2 years ago
- Converts Sigma detection rules to a Splunk alert configuration.☆12Jul 1, 2021Updated 4 years ago
- Crowdstrike response script containing various functions for IR/triage☆12Dec 7, 2020Updated 5 years ago
- A dataset of phishing kits in the wild☆15Jun 1, 2024Updated last year
- ☆34Aug 8, 2023Updated 2 years ago
- ☆105Jul 5, 2025Updated 9 months ago
- A Python library to help with some common threat hunting data analysis operations☆142Apr 23, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Exfiltrate blind Remote Code Execution and SQL injection output over DNS via Burp Collaborator.☆277Jan 28, 2025Updated last year
- Email Abuse - A Versatile Software for Email review, analysis and reporting☆21Jul 17, 2015Updated 10 years ago
- OSSEM Detection Model☆184Oct 11, 2022Updated 3 years ago
- OASIS Cyber Threat Intelligence (CTI) TC: A tool for generating STIX content for prototyping and testing. https://github.com/oasis-open/c…☆43Apr 15, 2024Updated last year
- OASIS Cyber Threat Intelligence (CTI) TC Open Repository: Convert STIX 1.2 XML to STIX 2.x JSON☆52Apr 15, 2024Updated last year
- Active Directory Purple Team Playbook☆116May 8, 2023Updated 2 years ago
- Spam trap management☆24Jun 18, 2024Updated last year
- botnet frontend i wrote in a night and then improved over a few other nights☆13Apr 11, 2019Updated 7 years ago
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆127Dec 5, 2023Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Tools used by CSIRT and especially in the scope of CNW☆18Feb 26, 2026Updated last month
- stix-icons is a collection of colourful and clean icons for use in software, training and marketing material to visualize cyber threats a…☆38Dec 15, 2022Updated 3 years ago
- This module installs and configures MISP (Malware Information Sharing Platform)☆14Mar 27, 2026Updated 2 weeks ago
- An advanced Twitter scraping & OSINT tool written in Python that doesn't use Twitter's API, allowing you to scrape a user's followers, fo…☆13Aug 19, 2022Updated 3 years ago
- Random Code Store☆17Mar 27, 2023Updated 3 years ago
- Cli interface to threatcrowd.org☆20Jul 6, 2017Updated 8 years ago
- Atomic Red Team Simple Parser☆13Sep 21, 2018Updated 7 years ago