target / strelkaLinks
Real-time, container-based file scanning at enterprise scale
☆948Updated this week
Alternatives and similar repositories for strelka
Users that are interested in strelka are comparing it to the libraries listed below
Sorting:
- A framework for developing alerting and detection strategies for incident response.☆784Updated last week
- A set of Zeek scripts to detect ATT&CK techniques.☆604Updated last year
- A knowledge base of actionable Incident Response techniques☆648Updated 3 years ago
- Mapping the MITRE ATT&CK Matrix with Osquery☆802Updated 2 years ago
- Actionable analytics designed to combat threats☆998Updated 3 years ago
- Incident Response Documentation made easy. Developed by Incident Responders for Incident Responders☆938Updated last year
- Open Source Security Events Metadata (OSSEM)☆1,272Updated 2 years ago
- Extract and aggregate threat intelligence.☆882Updated last year
- Beagle is an incident response and digital forensics tool which transforms security logs and data into graphs.☆1,324Updated 2 years ago
- A Splunk app mapped to MITRE ATT&CK to guide your threat hunts☆1,162Updated 2 years ago
- A utility to safely generate malicious network traffic patterns and evaluate controls.☆1,325Updated last year
- Cortex Analyzers Repository☆466Updated this week
- A repository for using osquery for incident detection and response☆859Updated last week
- DFIRTrack - The Incident Response Tracking Application☆521Updated last year
- Python Script to access ATT&CK content available in STIX via a public TAXII server☆567Updated 8 months ago
- Repository of YARA rules made by Trellix ATR Team☆610Updated 5 months ago
- A Python package to interact with the Mitre ATT&CK Framework☆477Updated last year
- Online hash checker for Virustotal and other services☆834Updated 5 months ago
- Re-play Security Events☆1,676Updated last year
- IntelMQ is a solution for IT security teams for collecting and processing security feeds using a message queuing protocol.☆1,077Updated last week
- Python library to parse and convert Sigma rules into queries (and whatever else you could imagine)☆483Updated this week
- ReversingLabs YARA Rules☆850Updated 2 weeks ago
- An information security preparedness tool to do adversarial simulation.☆1,133Updated 6 years ago
- Documentation of TheHive☆400Updated last year
- A repository of curated datasets from various attacks☆673Updated this week
- Cyber Analytics Repository☆955Updated 3 months ago
- Phantom Community Playbooks☆513Updated last week
- Your Everyday Threat Intelligence☆1,904Updated 3 weeks ago
- Cortex: a Powerful Observable Analysis and Active Response Engine☆1,475Updated last month
- MISP trainings, threat intel and information sharing training materials with source code☆415Updated 3 months ago