plast
Threat detection framework
A modular threat-hunting tool framework for detecting indicators of compromise in incident-response operations.
Modular command-line threat hunting tool & framework.
17 stars
2 watching
4 forks
Language: Python
last commit: over 4 years ago
Linked from 1 awesome list
aptdigital-forensicsframeworkincident-responseiocpythonpython3threat-huntingyara
Related projects:
Repository | Description | Stars |
---|---|---|
| A language and runtime framework for building reusable, composable threat hunting workflows using Python. | 302 |
| A collection of tools and resources for threat hunters to identify and respond to cyber threats. | 861 |
| An informational repository providing resources and knowledge for detecting adversaries in IT environments. | 1,726 |
| A framework for generating actionable analytics to combat threats based on threat modeling and incident response | 975 |
| An advanced threat intelligence framework that integrates real-time IP reputation and historical data analysis to identify malicious traffic | 239 |
| A platform for searching and analyzing publicly available online data to detect potential security threats | 515 |
| A framework to collect and visualize threat intelligence information from various sources in a flexible and plugin-based architecture. | 309 |
| An open-source tool utilizing machine learning to assist threat analysts in identifying security problems. | 112 |
| Automates threat modeling and documentation for software systems. | 934 |
| Collection of resources and concepts for threat hunting and detection engineering. | 372 |
| An eBPF-based tool for comprehensive Linux event monitoring and analysis | 403 |
| A collection of threat detection methodologies and tools to help security teams identify and respond to emerging threats. | 88 |
| Provides Splunk queries to detect vulnerability exploitation attempts and subsequent compromise, including threat hunting for MITRE ATT&CK TTPs | 58 |
| A PowerShell repository to simulate and train threat hunting skills without malicious files. | 134 |
| Automates scanning of publicly hosted pasted data against Yara rules to identify potential security or research threats. | 1,069 |