st0pp3r / awesome-detection-engineerLinks
Online resources related to Detection Engineering. Detection rules, detection logic, attack samples, detection tests and emulation tools, logging configuration and best practices, event log references, resources, labs, data manipulation online tools, blogs, newsletters, good reads, books, trainings, podcasts, videos and twitter/x accounts.
☆136Updated last month
Alternatives and similar repositories for awesome-detection-engineer
Users that are interested in awesome-detection-engineer are comparing it to the libraries listed below
Sorting:
- Mapping of open-source detection rules and atomic tests.☆193Updated 11 months ago
- ☆119Updated 7 months ago
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆160Updated 8 months ago
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆115Updated last year
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆125Updated last year
- Jupyter Univere is a search engine for all infosec jupyter notebooks☆33Updated 9 months ago
- ☆74Updated last week
- A collection of various SIEM rules relating to malware family groups.☆70Updated last year
- CarbonBlack EDR detection rules and response actions☆73Updated last year
- A starter pack of resources to help you get started in Detection Engineering.☆177Updated 4 months ago
- Purpleteam scripts simulation & Detection - trigger events for SOC detections☆192Updated last year
- A collection of CVEs weaponized by ransomware operators☆128Updated 2 months ago
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆81Updated 8 months ago
- Raw data from Threat Intelligence Reports with automatic reports collection and keyword search across thousands of reports☆144Updated last week
- Suzaku (朱雀) is a sigma-based threat hunting and fast forensics timeline generator for cloud logs.☆163Updated 2 weeks ago
- The Eventlog Compendium is the go-to resource for understanding Windows Event Logs.☆51Updated 8 months ago
- A repository to share publicly available Velociraptor detection content☆191Updated this week
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.☆53Updated last year
- A preconfigured Velociraptor triage collector☆74Updated last month
- VirtualGHOST Detection Tool☆101Updated 3 weeks ago
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆150Updated last year
- MISP Playbooks☆222Updated 2 months ago
- The ultimate repository for remotely deploying Crowdstrike sensors quickly and discreetly on any other EDR platform.☆23Updated 4 months ago
- VelociraptorMCP is a Model Context Protocol bridge for exposing LLMs to MCP clients.☆64Updated 4 months ago
- An automated Adversary Emulation lab with terraform and MCP server. Build Caldera techniques and operations assisted with LLMs. Built f…☆204Updated last month
- Sigma detection rules for hunting with the threathunting-keywords project☆57Updated 9 months ago
- ☆95Updated last month
- Adversarial Interception Mission Oriented Discovery and Disruption Framework, or AIMOD2, is a structured threat hunting approach to proac…☆89Updated 2 years ago
- This project aims to bridge the gap between Microsoft Attack Surface Reduction (ASR) rules and MITRE ATT&CK by mapping ASR rules to their…☆29Updated last year
- A tool collection for filtering and visualizing logon events. Designed to help answering the "Cotton Eye Joe" question (Where did you com…☆180Updated 7 months ago