Showing 36 of 54 projects
A curated collection of awesome software, libraries, books, and resources for cybersecurity professionals.
A curated list of awesome malware analysis tools, resources, and related information for security professionals.
A curated list of awesome malware analysis tools, resources, and related information for security professionals.
A curated list of free and open-source honeypot resources, tools, and related components for cybersecurity research.
A curated list of awesome open-source threat intelligence resources, including feeds, tools, platforms, and standards.
A curated list of tools and resources for digital forensics and incident response (DFIR) teams.
A curated list of tools and resources for digital forensics and incident response (DFIR) teams.
An open-source adversary emulation platform that simulates malware attacks to test and improve network security defenses.
An automated cyber security platform for adversary emulation, red teaming, and incident response built on the MITRE ATT&CK framework.
Event-driven automation platform for DevOps and SREs, enabling auto-remediation, incident response, and workflow orchestration across tools.
An open-source platform for collecting, storing, sharing, and acting upon cybersecurity threat intelligence and indicators.
A high-quality, commented Sysmon configuration template for Windows system monitoring and incident investigation.
A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.
An incident response framework for remote live forensics with Python client-server architecture.
A curated list of awesome free forensic analysis tools, resources, and learning materials for digital investigators.
A curated list of awesome free (mostly open source) forensic analysis tools and resources for digital investigations.
A comprehensive collection of Yara rules for malware detection, vulnerability identification, and security analysis.
A curated list of awesome open-source tools, detection rules, datasets, and resources for threat detection and hunting.
A curated list of awesome YARA rules, tools, and resources for malware researchers and security professionals.
A memory forensics framework for extracting digital artifacts from volatile memory (RAM) samples across Windows, Linux, and macOS.
An endpoint visibility and collection tool using the Velociraptor Query Language (VQL) for host-based state information gathering.
A simple IOC and YARA scanner for detecting malware and security threats via file names, hashes, YARA rules, and C2 connections.
A fast, standalone tool for rapid threat hunting and forensic analysis of Windows event logs and other forensic artefacts.
An open-source tool for collaborative forensic timeline analysis, enabling teams to organize, annotate, and investigate timelines together.
A security tool that visualizes and analyzes Windows Active Directory event logs to investigate malicious logon activity.
A free Mac OS X computer forensics tool that parses system artifacts, extracts user data, and verifies file reputation.
A Linux distribution for threat hunting, enterprise security monitoring, and log management.
A Sigma-based threat hunting and fast forensics timeline generator for Windows event logs, written in Rust.
An open-source forensic toolkit for analyzing disk images and file systems to identify and recover digital evidence.
A modular repository of Sysmon configuration modules for customizable endpoint detection and logging.
A Windows Batch script toolset that simulates Advanced Persistent Threat (APT) attack indicators to test security monitoring and detection capabilities.
Snort and YARA rules to detect attacks using FireEye's red team tools, released after their 2020 breach disclosure.
A public repository for developing, testing, and maintaining detection rules for Elastic Security's SIEM, with tools for Detections as Code.
A collection of 200 Windows EVTX event log samples mapped to MITRE ATT&CK techniques for detection testing and threat hunting.
A Windows security tool for real-time adversary tradecraft detection, memory scanning, and forensics via behavior-driven rules.
A PowerShell module for threat hunting and detecting malicious activity via Windows Event Logs.
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.