threat-punter / security-publicationsView external linksLinks
Detection Engineering research, open-source tools, conference presentations, and technical publications shared with the security community.
☆28Dec 17, 2025Updated last month
Alternatives and similar repositories for security-publications
Users that are interested in security-publications are comparing it to the libraries listed below
Sorting:
- Repository with Sample threat hunting notebooks on Security Event Log Data Sources☆69Dec 2, 2022Updated 3 years ago
- A guide to simplify the process of evaluating Datadog's Cloud SIEM security capabilities to detect AWS threats.☆19Jul 24, 2023Updated 2 years ago
- A collection of utilities to help with analysis on the command line.☆18Aug 9, 2024Updated last year
- This is a repository from Adam Swan and I's presentation on Windows Logs Zero 2 Hero.☆22Jan 30, 2018Updated 8 years ago
- A script to create and assign SOP tasks into the cases☆20Aug 16, 2020Updated 5 years ago
- Cyber Threat Intelligence☆74Dec 7, 2025Updated 2 months ago
- This is a collection of Security Baselines that I use in my virtual lab environment.☆22Mar 11, 2020Updated 5 years ago
- Cloud-native SIEM for intelligent security analytics for your entire enterprise.☆22Nov 22, 2021Updated 4 years ago
- TIBER-Cases is a project created to give cases of The Hive platform for Threat Intelligence Analysts mainly. All the cases are mapped to …☆27Jul 13, 2022Updated 3 years ago
- Nagios dashboard in ncurses☆18Jul 12, 2017Updated 8 years ago
- Threat Detection & Anomaly Detection rules for popular open-source components☆53Jul 27, 2022Updated 3 years ago
- Forensics triage tool relying on Volatility and Foremost☆25Dec 3, 2023Updated 2 years ago
- MasterParser is a simple, all-in-one, digital forensics artifact parser☆24Jul 9, 2021Updated 4 years ago
- 🚨ATTENTION🚨 The VERIS mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here …☆72Apr 3, 2024Updated last year
- bro on debian with elasticsearch support☆24Mar 27, 2017Updated 8 years ago
- The aim of this repository is to provide a list of examples of tools, sources and measures available to incident response teams☆64Jul 15, 2020Updated 5 years ago
- Bro Intel Feed Linter☆26Aug 30, 2019Updated 6 years ago
- Detection Ideas & Rules repository.☆178Sep 10, 2021Updated 4 years ago
- Hogzilla is an Intrusion Detection System (IDS) supported by Snort, Apache Spark, HBase and libnDPI, which provides Network Anomaly Detec…☆28Apr 18, 2018Updated 7 years ago
- ☆28Nov 25, 2025Updated 2 months ago
- A proof-of-concept Linux clone of Santa, Google's binary authorization system for macOS☆34Nov 24, 2022Updated 3 years ago
- A collection of Indicators of Compromise (IoCs), most aligning with samples derived from the signatures in the YARA-Signatures repo☆29Jun 11, 2020Updated 5 years ago
- Command line tool to interact with Chronicle's Config Based Normalizer (CBN) APIs.☆32Aug 31, 2023Updated 2 years ago
- File integrity monitor with malware detection using machine learning☆14May 23, 2024Updated last year
- Disclaimer: Please note that these materials are public available in several reference websites. These materials are not only the source …☆12Dec 31, 2023Updated 2 years ago
- ☆38Nov 2, 2024Updated last year
- The "Let's-defend-solution" directory contains the answers to all paths of the Let's Defend platform that were saved by the creator 8 mon…☆12Apr 27, 2023Updated 2 years ago
- Simple yara rule manager☆66Dec 27, 2022Updated 3 years ago
- A POC to implement Detection-as-Code with Terraform and Sumo Logic.☆30Jul 27, 2023Updated 2 years ago
- Mapping NSM rules to MITRE ATT&CK☆73Aug 29, 2020Updated 5 years ago
- OSSEM Modular☆27Jun 29, 2020Updated 5 years ago
- An example for implementation of ssdeep similarity search optimized with elasticsearch☆34Sep 19, 2017Updated 8 years ago
- intelligence-icons is a collection of icons and diagrams for building training and marketing materials around Intelligence sharing; inclu…☆41Mar 17, 2019Updated 6 years ago
- STIX 2.1 Visualizer, Attack and Activity Thread Graph for Threat Modeling☆33Dec 9, 2024Updated last year
- Primary data pipelines for intrusion detection, security analytics and threat hunting☆85Jan 9, 2022Updated 4 years ago
- An advanced AI-driven vulnerability scanner and penetration testing tool that integrates multiple AI providers (OpenAI, Grok, OLLAMA, Cla…☆34Nov 7, 2025Updated 3 months ago
- IT Risk Management tools☆14Apr 4, 2025Updated 10 months ago
- Living off the False Positive!☆41Jan 31, 2025Updated last year
- ☆12Jun 9, 2021Updated 4 years ago