Detection Engineering research, open-source tools, conference presentations, and technical publications shared with the security community.
☆28Dec 17, 2025Updated 4 months ago
Alternatives and similar repositories for security-publications
Users that are interested in security-publications are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A guide to simplify the process of evaluating Datadog's Cloud SIEM security capabilities to detect AWS threats.☆20Jul 24, 2023Updated 2 years ago
- A collection of utilities to help with analysis on the command line.☆18Aug 9, 2024Updated last year
- Tools for Incident Response and Malware Analysis☆11Feb 9, 2025Updated last year
- Repository created to share information about tactics, techniques and procedures used by threat actors. Initially with ransomware groups …☆47Updated this week
- Repository with Sample threat hunting notebooks on Security Event Log Data Sources☆69Dec 2, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A POC to implement Detection-as-Code with Terraform and Sumo Logic.☆31Jul 27, 2023Updated 2 years ago
- A script to create and assign SOP tasks into the cases☆20Aug 16, 2020Updated 5 years ago
- bro on debian with elasticsearch support☆24Mar 27, 2017Updated 9 years ago
- Configure and deploy AWS GuardDuty.☆12Sep 9, 2025Updated 8 months ago
- Cloud-native SIEM for intelligent security analytics for your entire enterprise.☆22Nov 22, 2021Updated 4 years ago
- 🚨ATTENTION🚨 The VERIS mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here …☆72Apr 3, 2024Updated 2 years ago
- Hikeshi is a security incident response application that keeps documenting incidents simple, so you can focus on fighting fires.☆21Mar 6, 2023Updated 3 years ago
- This is a repository from Adam Swan and I's presentation on Windows Logs Zero 2 Hero.☆22Jan 30, 2018Updated 8 years ago
- ☆19Oct 17, 2023Updated 2 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Community curated list of templates for the nuclei engine to find security vulnerabilities.☆10Jan 5, 2022Updated 4 years ago
- Find world writable directories that contain a .exe or .dll file☆13Aug 31, 2021Updated 4 years ago
- All my blogs for ExpDev, HTB, BinaryExploit, Etc.☆13Jul 17, 2024Updated last year
- Threat Detection & Anomaly Detection rules for popular open-source components☆53Jul 27, 2022Updated 3 years ago
- Easily embed table in your Pelican articles.☆13Jan 12, 2023Updated 3 years ago
- ☆13May 9, 2022Updated 4 years ago
- Mapping NSM rules to MITRE ATT&CK☆73Aug 29, 2020Updated 5 years ago
- Detection Ideas & Rules repository.☆178Sep 10, 2021Updated 4 years ago
- TIBER-Cases is a project created to give cases of The Hive platform for Threat Intelligence Analysts mainly. All the cases are mapped to …☆27Jul 13, 2022Updated 3 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Like the unix tree command but for GCP Org Heirarchy☆27Apr 29, 2021Updated 5 years ago
- Cyber Threat Intelligence☆79Dec 7, 2025Updated 5 months ago
- Demo for Elastic's Auditbeat and SIEM☆24Jun 15, 2021Updated 4 years ago
- Nagios dashboard in ncurses☆18Jul 12, 2017Updated 8 years ago
- Find kernel32 base and API addresses. Simple C++ implementation☆24Apr 7, 2022Updated 4 years ago
- Living off the False Positive!☆42Apr 3, 2026Updated last month
- PHP OOP Login/Register System☆16May 1, 2023Updated 3 years ago
- Dash rootkit. Linux Trojan Backdoor. (MALWARE)☆12Apr 3, 2023Updated 3 years ago
- Suricata RPMs for CentOS/RHEL and Fedora☆19Mar 17, 2026Updated last month
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A Python, Boto3 script that leverages a forensic volume to attach & mount to a selected instance, run a memory dump, unmount and detach f…☆12Jul 15, 2020Updated 5 years ago
- High performance time ordered PCAP merging utility☆24Jun 20, 2022Updated 3 years ago
- ☆20Apr 10, 2025Updated last year
- A proof-of-concept Linux clone of Santa, Google's binary authorization system for macOS☆34Nov 24, 2022Updated 3 years ago
- ☆29Nov 25, 2025Updated 5 months ago
- SIEGMA - Transform Sigma rules into SIEM consumables☆159Mar 10, 2025Updated last year
- This is a collection of Security Baselines that I use in my virtual lab environment.☆23Mar 11, 2020Updated 6 years ago