An open API service providing repository metadata for many open source software ecosystems.

GitHub topics: threat-detection

sefinek/Malicious-IP-Addresses

A list of malicious IP addresses associated with botnets, cyberattacks, and the generation of artificial traffic on websites. Useful for network administrators and security companies to block threats and protect against DDoS attacks.

Language: JavaScript - Size: 19.7 MB - Last synced at: about 23 hours ago - Pushed at: about 24 hours ago - Stars: 25 - Forks: 0

P1rat3L00t/BLU3F1R3

Fileless PoC malware for educational & security research purposes.

Language: C++ - Size: 563 KB - Last synced at: 1 day ago - Pushed at: 1 day ago - Stars: 0 - Forks: 0

jason-p-nguyen/threat-hunting-labs

A collection of handsโ€‘on labs demonstrating real-world threat hunting with Microsoft Defender for Endpoint (MDE)

Size: 1.5 MB - Last synced at: 1 day ago - Pushed at: 1 day ago - Stars: 0 - Forks: 0

kunai-project/kunai

Threat-hunting tool for Linux

Language: Rust - Size: 1.2 MB - Last synced at: 1 day ago - Pushed at: 13 days ago - Stars: 922 - Forks: 64

raditz22/Awesome-AI-Deception

An awesome list of resources on AI cyber deception, exploring adversarial machine learning techniques used to deceive and secure systems

Size: 4.88 KB - Last synced at: 1 day ago - Pushed at: 2 days ago - Stars: 1 - Forks: 0

AlbinoGazelle/esxi-testing-toolkit

๐Ÿงฐ ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.

Language: Python - Size: 13 MB - Last synced at: about 20 hours ago - Pushed at: 2 months ago - Stars: 76 - Forks: 10

pratiyk/Link-Load

A modular cybersecurity platform for scanning malicious links, monitoring threats, and integrating secure-by-design practices in applications. Link & Load helps developers, analysts, and small businesses stay ahead of cyber threats by offering a security-first, plug-and-play system

Language: JavaScript - Size: 64.5 KB - Last synced at: 3 days ago - Pushed at: 3 days ago - Stars: 1 - Forks: 0

vVv-Keys/cybernetics-cti

๐Ÿง  Cybernetics Platform โ€“ Q2 2025 Update

Size: 7.81 KB - Last synced at: 3 days ago - Pushed at: 3 days ago - Stars: 0 - Forks: 0

proudkepri/awesome-blackhat-arsenal

Awesome Black Hat Arsenal is a curated collection of innovative cybersecurity tools from Black Hat Arsenal events. Discover essential resources for red teaming, blue teaming, appsec, and OSINT. ๐Ÿ› ๏ธ๐ŸŒ

Language: Python - Size: 1.94 MB - Last synced at: 3 days ago - Pushed at: 3 days ago - Stars: 0 - Forks: 0

Krishna04-06/Why-so-Serious-SAM

This repository, "Why-so-Serious-SAM," showcases a proof of concept for the HiveNightmare fileless exploit on Windows 11. ๐Ÿ™ Dive into the details of fileless malware techniques and their implications for security. ๐Ÿ›ก๏ธ

Language: C - Size: 6.52 MB - Last synced at: 3 days ago - Pushed at: 3 days ago - Stars: 0 - Forks: 0

Net-Zer0/Malware-ResearchDump-RoCompile-JavaScript-Stealer-Campaign

Dump of the payload from texturecraft.us, A malware campaign that targeted Roblox users using bookmark bar JavaScript injection to steal credentials. Named RoCompile as it operates similar to RoLinked, also the strings in the payload that say compile avatar.

Language: JavaScript - Size: 469 KB - Last synced at: 3 days ago - Pushed at: 3 days ago - Stars: 1 - Forks: 0

nazeh643/flowhawk

FlowHawk is an open-source network security monitoring platform that uses eBPF for efficient packet processing. It offers real-time visibility into network traffic and helps identify security threats quickly. ๐Ÿฆ…๐ŸŒ

Language: Go - Size: 173 KB - Last synced at: 4 days ago - Pushed at: 4 days ago - Stars: 0 - Forks: 0

H1-REAPER/SentinelCore

SentinelCore is a robust network security tool designed to protect your systems with smart monitoring and threat detection. Join our community on GitHub to contribute and enhance network safety! ๐Ÿ›ก๏ธโœจ

Size: 1.09 MB - Last synced at: 4 days ago - Pushed at: 4 days ago - Stars: 0 - Forks: 0

spmedia/Crypto-Scam-and-Crypto-Phishing-Threat-Intel-Feed

A fresh feed of crypto phishing and crypto scam websites. Automatically updated daily/frequently.

Size: 562 KB - Last synced at: 4 days ago - Pushed at: 4 days ago - Stars: 25 - Forks: 2

thalesgroup-cert/Watcher

Watcher - Open Source Cybersecurity Threat Hunting Platform. Developed with Django & React JS.

Language: Python - Size: 17.6 MB - Last synced at: 4 days ago - Pushed at: 4 days ago - Stars: 930 - Forks: 134

Glenwestinat/RAMAPOT

RAMAPOT offers a streamlined way to deploy multiple honeypots on Kubernetes, ensuring centralized logging and real-time monitoring. ๐Ÿ™ With its scalable design, users can easily add more honeypots as needed. ๐Ÿ’ป

Language: Dockerfile - Size: 1.04 MB - Last synced at: 5 days ago - Pushed at: 5 days ago - Stars: 0 - Forks: 0

Lasara26/Attack-Detection-with-Machine-Learning

This project focuses on detecting cyber attacks using machine learning techniques. It employs various algorithms to analyze network traffic and identify potential threats in real-time.

Language: Python - Size: 2.37 MB - Last synced at: 6 days ago - Pushed at: 6 days ago - Stars: 0 - Forks: 0

infosecB/awesome-detection-engineering

Detection Engineering is a tactical function of a cybersecurity defense program that involves the design, implementation, and operation of detective controls with the goal of proactively identifying malicious or unauthorized activity before it negatively impacts an individual or an organization.

Size: 116 KB - Last synced at: 6 days ago - Pushed at: 2 months ago - Stars: 995 - Forks: 90

5kidRo0t/VenomStrike

VenomStrike: A lightweight, blazing-fast malware scanner that identifies known threats via SHA-256, MD5 hashes and YARA rules. Confirms if a file is a known malware sample. No bloat โ€” just raw speed, simplicity, and full portability.

Language: YARA - Size: 89.8 KB - Last synced at: 6 days ago - Pushed at: 6 days ago - Stars: 1 - Forks: 0

elastic/detection-rules

Language: Python - Size: 267 MB - Last synced at: 6 days ago - Pushed at: 6 days ago - Stars: 2,336 - Forks: 572

Blu3L33t/Blu3L33t

Fileless malware for educational and research purposes only.

Language: Batchfile - Size: 45.9 KB - Last synced at: 6 days ago - Pushed at: 6 days ago - Stars: 0 - Forks: 0

akto-api-security/akto

Proactive, Open source API security โ†’ API discovery, API Security Posture, Testing in CI/CD, Test Library with 1000+ Tests, Add custom tests, Sensitive data exposure

Language: Java - Size: 242 MB - Last synced at: 6 days ago - Pushed at: 6 days ago - Stars: 1,328 - Forks: 250

Net-Zer0/Malware-ResearchDump-Texturecraft-JavaScript-Stealer-Campaign

Dump of bookmark injection-based credential stealers from https://texturecraft.us https://texturecraft.org https://rbxtexture.com https://rotemplate.com/ https://www.bloxavatar.com/ https://rbxformat.com/ https://rbxcreator.com/ https://rbxart.com/ https://www.rbxvisual.com/ https://rbxbuild.com/

Language: JavaScript - Size: 506 KB - Last synced at: 6 days ago - Pushed at: 6 days ago - Stars: 1 - Forks: 0

turbot/tailpipe

select * from logs; Tailpipe is an open source SIEM for instant log insights, powered by DuckDB. Analyze millions of events in seconds, right from your terminal.

Language: Go - Size: 40.4 MB - Last synced at: 7 days ago - Pushed at: 7 days ago - Stars: 437 - Forks: 9

XiAnzheng-ID/Yara-Rules

Heuristic Yara Rule (DO NOT USE THIS AS A SIGNATURE BASE IT CAN CREATE MANY FP)

Language: YARA - Size: 9.77 KB - Last synced at: 7 days ago - Pushed at: 7 days ago - Stars: 0 - Forks: 0

P1rat3xai/Nightmare

PoC 'fileless' malware for educational and research purposes only.

Language: C - Size: 4.03 MB - Last synced at: 8 days ago - Pushed at: 8 days ago - Stars: 0 - Forks: 0

ngpepin/LLM-powered-network-threat-monitor

An AI-assisted threat monitoring solution for networks, leveraging Snort, ntopng, pfSense, pfBlockerNG, and LLM analyses to detect, assess and take action in real time against malicious traffic. Integrates automated blacklist generation and comprehensive threat intelligence reporting via a web page and PDF reports.

Language: Shell - Size: 1.2 MB - Last synced at: 8 days ago - Pushed at: 8 days ago - Stars: 0 - Forks: 0

utmstack/UTMStack

Enterprise-ready SIEM, SOAR and Compliance powered by real-time correlation and threat intelligence.

Language: Java - Size: 187 MB - Last synced at: 4 days ago - Pushed at: 4 days ago - Stars: 279 - Forks: 36

KNJSoft/AlertSafe

Intruision Detection System

Language: Python - Size: 15.6 KB - Last synced at: 10 days ago - Pushed at: 10 days ago - Stars: 0 - Forks: 0

spmedia/Telegram-Channel-Joiner

A python bot that uses the Pyrogram API Framework to take a list of Telegram channels and groups and joins them.

Language: Python - Size: 4.75 MB - Last synced at: 11 days ago - Pushed at: 11 days ago - Stars: 2 - Forks: 3

anishvedant/Cybersecurity-Home-Lab

A virtualized cybersecurity home lab built on VirtualBox featuring pfSense, Wazuh, MITRE Caldera, Nessus, and Active Directory for hands-on threat detection, red teaming, and SOC simulation.

Size: 7.88 MB - Last synced at: 4 days ago - Pushed at: 11 days ago - Stars: 0 - Forks: 0

npragin/iomt-mqtt-threat-detection

IoMT network traffic over MQTT classification as malicious/benign. Compares multiple ML models and techniques for addressing feature selection, scaling, and class imbalance.

Language: Python - Size: 408 KB - Last synced at: 4 days ago - Pushed at: 12 days ago - Stars: 0 - Forks: 0

spmedia/PhishingSecLists

To be used with tools like GoBuster & DirBuster but these lists are specifically tailored and designed for scanning phishing <>< landing pages and other malicious or sketch af financial/crypto fraud websites.

Size: 846 KB - Last synced at: 12 days ago - Pushed at: 12 days ago - Stars: 49 - Forks: 6

Willie-Conway/google-cybersecurity-certificate

๐Ÿ“š Hands-on labs, incident reports, risk assessments, and real-world cybersecurity projects completed as part of the Google Cybersecurity Professional Certificate. Focused on Linux, network security, Python, SQL, threat modeling, and SIEM tools.

Size: 41 MB - Last synced at: 1 day ago - Pushed at: 13 days ago - Stars: 1 - Forks: 0

Kzax01/AWS-Security-Aerosecure

AeroSecure: Where Aerospace Meets AWS Security : How to Secure an Aerospace Infra ? Let's see! ๐Ÿš€โ˜๏ธ๐Ÿ”

Size: 263 MB - Last synced at: 4 days ago - Pushed at: 14 days ago - Stars: 1 - Forks: 0

alexhraber/flowhawk

Real-time eBPF-powered network security monitoring platform with AI-driven threat detection. Detects port scans, DDoS attacks, botnet activity, and anomalies at 100Gbps+ speeds with sub-microsecond latency.

Language: Go - Size: 198 KB - Last synced at: 14 days ago - Pushed at: 14 days ago - Stars: 2 - Forks: 0

lixiasky/X-ray

A high-privilege behavior tracing and anti-malware tool with ISO comparison and auto-elimination capabilities.

Language: Go - Size: 17.8 MB - Last synced at: 16 days ago - Pushed at: 16 days ago - Stars: 3 - Forks: 0

arnvjshi/Threat-Detection-Dashboard

ThreatShield AI-powered threat detection system using GROQ to analyze audio, image, and text data. It extracts insights and flags potential threats in real-time across multiple media formats.

Language: TypeScript - Size: 402 KB - Last synced at: 16 days ago - Pushed at: 16 days ago - Stars: 2 - Forks: 1

elbraino/awesome-blackhat-arsenal

Curated collection of cybersecurity tools featured in Black Hat Arsenal events.

Size: 1.42 MB - Last synced at: 17 days ago - Pushed at: 17 days ago - Stars: 0 - Forks: 0

alikallel/RAMAPOT

Multi-honeypot deployment platform with centralized logging - Deploy Cowrie SSH, Elasticpot, and Redis honeypots on Kubernetes with Elastic Stack monitoring

Language: Dockerfile - Size: 1.03 MB - Last synced at: 17 days ago - Pushed at: 17 days ago - Stars: 0 - Forks: 0

A9u3ybaCyb3r/SOC-Phishing-Defense-Simulation

This controlled lab environment emphasizes practical cybersecurity skills, ethical practices, and the importance of proactive defense strategies.

Size: 787 KB - Last synced at: 19 days ago - Pushed at: 19 days ago - Stars: 3 - Forks: 0

DataDog/stratus-red-team

:cloud: :zap: Granular, Actionable Adversary Emulation for the Cloud

Language: Go - Size: 3.74 MB - Last synced at: 19 days ago - Pushed at: 20 days ago - Stars: 2,030 - Forks: 245

mrheinen/lophiid

A distributed honeypot for monitoring large scale web attacks

Language: Go - Size: 65.9 MB - Last synced at: 20 days ago - Pushed at: 21 days ago - Stars: 14 - Forks: 2

st0pp3r/awesome-detection-engineer

Online resources related to Detection Engineering. Detection rules, detection logic, attack samples, detection tests and emulation tools, logging configuration and best practices, event log references, resources, labs, data manipulation online tools, blogs, newsletters, good reads, books, trainings, podcasts, videos and twitter/x accounts.

Language: HTML - Size: 311 KB - Last synced at: 26 days ago - Pushed at: 26 days ago - Stars: 94 - Forks: 11

ajitashwath/dynamic-threat-response

A comprehensive security monitoring tool designed to detect and respond to potential threats on a computer system.

Language: Python - Size: 134 KB - Last synced at: 18 days ago - Pushed at: 27 days ago - Stars: 0 - Forks: 3

SriBalaji2112/Advanced-Techniques-for-Detecting-Anomalies-in-EDR-Logs-for-Cybersecurity-SOC-Analytics

This project focuses on building an AI-driven anomaly detection framework that uses the Isolation Forest algorithm to identify suspicious events in unstructured system log data.

Language: Python - Size: 10.6 MB - Last synced at: 28 days ago - Pushed at: 28 days ago - Stars: 0 - Forks: 0

Cyb3r-Monk/Threat-Hunting-and-Detection

Repository for threat hunting and detection queries, etc. for Defender for Endpoint and Microsoft Sentinel in KQL(Kusto Query Language).

Language: Jupyter Notebook - Size: 407 KB - Last synced at: 25 days ago - Pushed at: 3 months ago - Stars: 731 - Forks: 105

infosecB/generate_attacknav_layer

A Python CLI utility for quickly converting a list or text file of MITRE ATT&CK technique IDs to a MITRE ATT&CK Navigator layer .JSON file.

Language: Python - Size: 33 MB - Last synced at: 13 days ago - Pushed at: over 3 years ago - Stars: 4 - Forks: 0

GoogleCloudPlatform/security-analytics

Community Security Analytics provides a set of community-driven audit & threat queries for Google Cloud

Language: Python - Size: 965 KB - Last synced at: 29 days ago - Pushed at: about 1 year ago - Stars: 342 - Forks: 71

rfackroyd/detection-engineering-starter-pack

A starter pack of resources to help you get started in Detection Engineering.

Size: 12.7 KB - Last synced at: about 1 month ago - Pushed at: about 1 month ago - Stars: 1 - Forks: 0

trendmicro/tm-v1-fs-python-sdk

Trend Vision One File Security Python SDK

Language: Python - Size: 159 KB - Last synced at: about 6 hours ago - Pushed at: about 1 month ago - Stars: 1 - Forks: 1

spyboy-productions/WebSecProbe

Bypass 403

Language: Jupyter Notebook - Size: 2.69 MB - Last synced at: about 1 month ago - Pushed at: 4 months ago - Stars: 147 - Forks: 22

cyb3rmik3/KQL-threat-hunting-queries

A repository of KQL queries focused on threat hunting and threat detecting for Microsoft Sentinel & Microsoft XDR (Former Microsoft 365 Defender).

Size: 384 KB - Last synced at: about 1 month ago - Pushed at: about 1 month ago - Stars: 684 - Forks: 76

virtualISP/AI-Powered-Threat-Detection-System

A real-time security monitoring system that combines the ELK Stack (Elasticsearch, Logstash, Kibana) with Ollama's AI models (like Phi-3-mini) to automatically detect and analyze security threats in logs. Ideal for identifying brute-force attacks, SQLi, XSS, and moreโ€”with actionable insights visualized in Kibana dashboards.

Language: Python - Size: 189 KB - Last synced at: 20 days ago - Pushed at: about 1 month ago - Stars: 0 - Forks: 0

8-rahul/AI-Powered-Cybersecurity-Threat-Detection

AI-powered cybersecurity threat detection system that analyzes failed logins, packet sizes, and request frequency to identify potential threats.

Language: Python - Size: 312 KB - Last synced at: about 1 month ago - Pushed at: about 1 month ago - Stars: 0 - Forks: 0

ckvishwa/ai-malware-analysis

AI-powered malware analysis using CAPEv2, Python & ML

Language: Python - Size: 6.63 MB - Last synced at: about 1 month ago - Pushed at: about 1 month ago - Stars: 0 - Forks: 0

Compcode1/ioc1-recon

This IOC captures a foundational stage in the cyber kill chain: reconnaissance โ€” where the attacker has not yet breached the system, but is actively probing to discover what might be open, unguarded, or improperly exposed.

Language: Jupyter Notebook - Size: 0 Bytes - Last synced at: about 1 month ago - Pushed at: about 1 month ago - Stars: 0 - Forks: 0

hassanmajaro/log-anomaly-detector-using-splunk

A splunk-based system for detecting log anomalies, failed logins, and suspicious user behavior using queries, alerts, and dashboards.

Size: 5.27 MB - Last synced at: about 2 months ago - Pushed at: about 2 months ago - Stars: 0 - Forks: 0

USRRP/Dark-Web-Threat-Monitor

Language: Python - Size: 16.6 KB - Last synced at: about 2 months ago - Pushed at: about 2 months ago - Stars: 1 - Forks: 0

piratianraj/CloudGuardianAI

AI-powered cloud threat detection system that uses machine learning to identify anomalous activities in AWS CloudTrail logs. This system implements isolation forest, autoencoder, and graph-based analysis techniques to detect security threats that traditional methods might miss.

Language: Python - Size: 1.54 MB - Last synced at: about 2 months ago - Pushed at: about 2 months ago - Stars: 0 - Forks: 0

0x4D31/awesome-threat-detection

โœจ A curated list of awesome threat detection and hunting resources ๐Ÿ•ต๏ธโ€โ™‚๏ธ

Size: 47.7 MB - Last synced at: about 2 months ago - Pushed at: 11 months ago - Stars: 4,149 - Forks: 694

Lamentomori/TotalControl

Open-source NDR tool for blue teamers, offering real-time threat alerts, logging, and outbound traffic monitoring.

Size: 33.2 KB - Last synced at: about 2 months ago - Pushed at: about 2 months ago - Stars: 0 - Forks: 0

DataDog/threatest

Threatest is a CLI and Go framework for end-to-end testing threat detection rules.

Language: Go - Size: 382 KB - Last synced at: 28 days ago - Pushed at: about 2 months ago - Stars: 329 - Forks: 23

afernandez123/sql-log-analysis-soc

SOC analyst simulation: SQL-based log analysis, failed login detection, and suspicious activity flagging in PostgreSQL

Size: 6.84 KB - Last synced at: about 2 months ago - Pushed at: about 2 months ago - Stars: 0 - Forks: 0

LogCraftIO/logcraft-cli

Detection-as-Code CI/CD pipeline for modern security operations (SIEM, EDR, XDR, ...)

Language: Rust - Size: 592 KB - Last synced at: about 2 months ago - Pushed at: about 2 months ago - Stars: 21 - Forks: 1

Cybersight-Security/Global-Threat-Map

Global Threat Map is an interactive visualization tool that displays potential cybersecurity threats around the world using real IP data from FireHOL threat intelligence feeds

Language: JavaScript - Size: 23 MB - Last synced at: about 2 months ago - Pushed at: about 2 months ago - Stars: 0 - Forks: 0

mpengin/zerocrumb-yara-rules

Yara Rules to detect the ZeroCrumb Chrome "Exploit"/Killchain

Language: YARA - Size: 16.6 KB - Last synced at: about 2 months ago - Pushed at: about 2 months ago - Stars: 0 - Forks: 0

helenscun/mitre-attack-threat-mapper

A comprehensive Python tool that maps malware to MITRE ATT&CK techniques, generates threat intelligence reports, and creates custom red team playbooks. This application fetches the latest MITRE ATT&CK framework data, identifies techniques associated with specific malware, visualizes attack patterns, and provides actionable security recommendations.

Language: Python - Size: 0 Bytes - Last synced at: about 2 months ago - Pushed at: about 2 months ago - Stars: 0 - Forks: 0

El-Defaulter/Network-Security-Wazuh-ELK-Splunk

This project integrates Wazuh, ELK Stack (Elasticsearch, Logstash, Kibana), and Splunk to create a comprehensive network security monitoring solution. It collects, processes, stores, and analyzes security logs from endpoints and network devices, providing real-time threat detection, incident response, and visual dashboards.

Language: Shell - Size: 0 Bytes - Last synced at: about 2 months ago - Pushed at: about 2 months ago - Stars: 0 - Forks: 0

olafhartong/ATTACKdatamap

A datasource assessment on an event level to show potential coverage or the MITRE ATT&CK framework

Language: PowerShell - Size: 2.5 MB - Last synced at: about 1 month ago - Pushed at: over 4 years ago - Stars: 352 - Forks: 64

aymenmarjan/Implementing-AlienVault-OSSIM-with-Distributed-Architecture

A concise, stepโ€‘byโ€‘step guide to deploy AlienVault OSSIM in VirtualBox, Covering network setup, server & sensor installation, configuration, and threat monitoring. โ€‹

Size: 7.06 MB - Last synced at: about 2 months ago - Pushed at: about 2 months ago - Stars: 0 - Forks: 0

0xNslabs/Awesome-AI-Deception

An awesome list of resources on AI cyber deception, exploring adversarial machine learning techniques used to deceive and secure systems

Size: 4.88 KB - Last synced at: 2 months ago - Pushed at: 2 months ago - Stars: 0 - Forks: 0

ine-labs/ThreatSeeker

ThreatSeeker: Threat Hunting via Windows Event Logs

Language: Python - Size: 20.3 MB - Last synced at: about 2 months ago - Pushed at: about 2 years ago - Stars: 120 - Forks: 13

Yuriibe/PortGuardian

PortGuardian is a lightweight Python tool that detects and alerts on suspicious outbound network connections to untrusted or known-malicious services

Language: Python - Size: 7.81 KB - Last synced at: 2 months ago - Pushed at: 2 months ago - Stars: 0 - Forks: 0

Dhruv0306/Antivirus

A full-stack antivirus application built with Spring Boot and React, following X.800 security architecture. Features real-time file scanning, quarantine management, and system protection with a modern dashboard interface. Built with security-first approach and comprehensive threat detection capabilities.

Language: Java - Size: 1.54 MB - Last synced at: 2 months ago - Pushed at: 2 months ago - Stars: 0 - Forks: 0

FrancoGarciaC9701/Attack-Detection-with-Machine-Learning

Language: Python - Size: 2.37 MB - Last synced at: 2 months ago - Pushed at: 3 months ago - Stars: 0 - Forks: 0

GrizonRussell/SOC-Security-Log-Analyzer

SOC Security Log Analyzer: AI-powered threat detection for security professionals.

Language: Python - Size: 12.7 KB - Last synced at: 3 months ago - Pushed at: 3 months ago - Stars: 0 - Forks: 0

jackaduma/SecBERT

pretrained BERT model for cyber security text, learned CyberSecurity Knowledge

Language: Python - Size: 490 KB - Last synced at: about 2 months ago - Pushed at: about 2 years ago - Stars: 178 - Forks: 34

ParaCryptid/cybersecurity-network-defense

A next-generation Cybersecurity and Network Defense platform with Zero Trust Architecture, quantum cryptography, and adaptive threat detection for military operations.

Language: Python - Size: 32.2 KB - Last synced at: 3 months ago - Pushed at: 3 months ago - Stars: 0 - Forks: 0

iam-niranjan/SOC-Security-Log-Analyzer

SOC Security Log Analyzer: AI-powered threat detection for security professionals.

Language: Python - Size: 12.7 KB - Last synced at: 3 months ago - Pushed at: 3 months ago - Stars: 0 - Forks: 0

aws-ia/terraform-aws-guardduty

Configure and deploy AWS GuardDuty.

Language: HCL - Size: 839 KB - Last synced at: 2 months ago - Pushed at: 12 months ago - Stars: 9 - Forks: 15

infosecB/Rulehound

An index of publicly available and open-source threat detection rulesets.

Size: 286 KB - Last synced at: 3 months ago - Pushed at: 3 months ago - Stars: 1 - Forks: 0

franckferman/CassandraCTI

๐Ÿ”ฎ Collect, process, and automatically distribute Cyber Threat Intelligence from RSS feeds across multiple platforms.

Size: 151 KB - Last synced at: 3 months ago - Pushed at: 3 months ago - Stars: 5 - Forks: 0

gangula-karthik/AI-Services-in-Analytics

Homelander Level X-Ray Vision for Security โ€“ See Everything, Miss Nothing ๐Ÿšจโœˆ๏ธ

Language: Jupyter Notebook - Size: 651 MB - Last synced at: 22 days ago - Pushed at: 3 months ago - Stars: 0 - Forks: 0

aymenmarjan/MISP-Wazuh-Integration

A comprehensive integration solution connecting MISP threat intelligence with Wazuh security monitoring for real-time threat detection. This project provides step-by-step instructions for deploying, configuring, and integrating MISP and Wazuh with Sysmon to automatically detect indicators of compromise (IoCs) in your environment.

Size: 3.54 MB - Last synced at: 2 months ago - Pushed at: 3 months ago - Stars: 1 - Forks: 0

infosecB/detection-as-code

An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.

Language: Python - Size: 33.2 KB - Last synced at: 2 months ago - Pushed at: over 3 years ago - Stars: 55 - Forks: 14

paulveillard/cybersecurity-threat-detection

An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and videos, Technical guidelines and important resources about Threat Detection & Hunting.

Size: 138 KB - Last synced at: 3 months ago - Pushed at: over 2 years ago - Stars: 41 - Forks: 8

sergio11/zoneguardian

๐ŸŒ ZoneGuardian: A powerful tool to analyze DNS configurations, detect vulnerabilities, and generate actionable security reports. ๐Ÿ”’๐Ÿš€ Safeguard your digital assets with precision and ease!

Language: Python - Size: 1.13 MB - Last synced at: 3 months ago - Pushed at: 3 months ago - Stars: 4 - Forks: 0

hydecelestia7/Automated-SOC

This repository provides a comprehensive guide to setting up an Automated Security Operations Center (SOC) using open-source tools like Wazuh, TheHive, and Shuffle.

Size: 40 KB - Last synced at: 3 months ago - Pushed at: 3 months ago - Stars: 0 - Forks: 0

swisscom/detections ๐Ÿ“ฆ

Threat intelligence and threat detection indicators (IOC, IOA)

Language: YARA - Size: 1.47 MB - Last synced at: about 1 month ago - Pushed at: over 4 years ago - Stars: 52 - Forks: 10

krdmnbrk/atomicgen.io

A simple tool designed to create Atomic Red Team tests with ease.

Language: JavaScript - Size: 722 KB - Last synced at: 3 months ago - Pushed at: 3 months ago - Stars: 37 - Forks: 4

MuhammadAkhtarNadeem/Wazuh-Elastic-Stack-Anomaly-Detection-System

An AI-powered security monitoring system that performs real-time log analysis and anomaly detection using Wazuh, Elasticsearch, and Kibana. It helps detect and classify security threats efficiently.

Language: Jupyter Notebook - Size: 0 Bytes - Last synced at: 4 months ago - Pushed at: 4 months ago - Stars: 0 - Forks: 0

trendmicro/tm-v1-fs-nodejs-sdk

Trend Vision One File Security Node.js SDK

Language: TypeScript - Size: 472 KB - Last synced at: about 1 month ago - Pushed at: 4 months ago - Stars: 0 - Forks: 1

trendmicro/tm-v1-fs-java-sdk

Trend Vision One File Security Java SDK

Language: Java - Size: 96.7 KB - Last synced at: 3 months ago - Pushed at: 4 months ago - Stars: 1 - Forks: 0

trendmicro/tm-v1-fs-golang-sdk

Trend Vision One File Security Go SDK

Language: Go - Size: 75.2 KB - Last synced at: 3 months ago - Pushed at: 4 months ago - Stars: 2 - Forks: 0

mthcht/ThreatHunting-Keywords-sigma-rules

Sigma detection rules for hunting with the threathunting-keywords project

Language: Python - Size: 176 MB - Last synced at: 4 months ago - Pushed at: 4 months ago - Stars: 54 - Forks: 7

sloopstash/kickstart-elk

Collect Telemetry data from a variety of platforms, workloads, and services to implement Observability using Elastic (ELK) stack.

Language: Dockerfile - Size: 191 KB - Last synced at: 4 months ago - Pushed at: 4 months ago - Stars: 7 - Forks: 31

khulnasoft/osinsight

๐Ÿ” Production-ready detection & response queries for osquery ๐Ÿ›ก๏ธ Boost endpoint monitoring, detect threats ๐Ÿšจ, and streamline incident response โšก

Language: Makefile - Size: 3.15 MB - Last synced at: about 2 months ago - Pushed at: 2 months ago - Stars: 0 - Forks: 1

onder7/Real-Time-Threat-Detection

Python ile GeliลŸmiลŸ Siber Gรผvenlik ฤฐzleme Sistemi | Real-Time Threat Detection, Network Traffic Analysis, Log Monitoring & AI-Driven Alerts

Language: Python - Size: 19.5 KB - Last synced at: 4 months ago - Pushed at: 4 months ago - Stars: 0 - Forks: 0

MohamedMostafa010/SecurePortalModeling

This repository contains my first threat modeling project, focusing on a university financial system. It includes an online DFD, a detailed threat model created using Microsoft Threat Modeling Tool 2016, and an attack tree analysis for a specific identified threat.

Size: 5.57 MB - Last synced at: 3 months ago - Pushed at: 4 months ago - Stars: 0 - Forks: 0