Small-scale threat emulation and detection range built on Elastic and Atomic Redteam.
-
Updated
Dec 17, 2025 - Shell
8000
Small-scale threat emulation and detection range built on Elastic and Atomic Redteam.
Building one Solution for Threat management and detection for you network with Open source SOC solution.
Real-time HTTP/HTTPS DLP proxy with traffic inspection, detecting 44+ sensitive data patterns (PII, credentials, API keys, financial data). Features interactive dashboard, complete traffic capture, and flow viewer. Deploy in minutes with Docker. Stop data leaks before they happen. This is a tool that can test applications such as AI agents
A complete hands-on lab for learning SQL injection exploitation and detection using modern security tools. This repository accompanies a three-part article series that takes you from basic PHP exploitation to enterprise-grade detection with Sigma rules on Kubernetes.
🔍 Inspect and secure HTTPS traffic in real-time with a robust DLP proxy, monitoring sensitive data patterns and providing an interactive dashboard for alerts and analysis.
This project integrates Wazuh, ELK Stack (Elasticsearch, Logstash, Kibana), and Splunk to create a comprehensive network security monitoring solution. It collects, processes, stores, and analyzes security logs from endpoints and network devices, providing real-time threat detection, incident response, and visual dashboards.
AI-powered threat monitoring solution for small/SME networks, leveraging Snort, ntopng, pfSense, pfBlockerNG, and LLM analyses to detect, assess and take action in real time against malicious actors. Integrates automated blacklist generation and comprehensive threat intelligence reporting (web/PDF).
Next-generation AI-powered security distribution with quantum-resistant cryptography, blockchain audit, and autonomous self-healing
Detects host-level DDoS floods and UDP carpet-bombing patterns for early defensive warning.
Threat detection lab simulating security monitoring in Linux environments using log analysis, detection rules and correlation between authentication, system and resource events.
Interactive Bash tool that merges ss and netstat output, enriches IPs with ipinfo.io data, and displays real-time connection intelligence.
Enterprise-grade AI security scanner - local, private, comprehensive system security analysis
SOC Analyst home lab with Wazuh SIEM, Sysmon logging, brute-force detection, MITRE ATT&CK mapping, and incident response workflow.
Log monitoring and alerting project simulating SOC threat detection using threshold-based analysis. This script was developed as part of the Turn a New Leaf project , an automated log monitoring workflow .
Incident response lab simulating a real-world security incident lifecycle, including detection, investigation, containment and remediation of a brute force attack using log analysis and response playbooks.
Monitors listening ports and alerts on sudden exposure changes or suspicious service surges.
SOC Detection Engineering & Incident Investigation with Wazuh across Linux and Windows endpoints
Open-source security operations center (SOC) lab environment designed for defenders, detection engineers, and security analysts to learn and practice blue team tradecraft in a controlled, reproducible, and fork-friendly setting.
⚡ Open-Source SOC Alert Notifier | Wazuh • Kibana • Filebeat • Slack • Elasticsearch – Real-Time Threat Detection & Alert Automation
SIEM lab simulating centralized log monitoring, event correlation and alert generation using authentication and system logs with detection rules based on real-world security scenarios.
Add a description, image, and links to the threat-detection topic page so that developers can more easily learn about it.
To associate your repository with the threat-detection topic, visit your repo's landing page and select "manage topics."