Loading...

Looking for alternatives to TruKno? Agentic AI threat hunting platform with real-time MITRE ATT&CK intelligence. Browse 23 similar Security Operations tools below, compare features side-by-side, and find the best fit for your security stack.
Federated SecOps platform for threat hunting across SIEMs, EDRs & data lakes.
Community platform for sharing and creating detection rules with AI
Threat detection marketplace with Sigma rules for SIEM and shift-left detection
Threat hunting platform with free hunt packages and educational resources.
Proactive threat hunting platform for detecting and investigating attacks
AI-driven threat detection & hunting platform with MITRE ATT&CK analytics
Deep OSINT investigation tool for threat actor attribution and analysis
Managed service with human analysts hunting threats across client networks.
Expands a single malware hash into full family visibility via structural analysis.
AI agent that autonomously validates threat hunt hypotheses across enterprise data
Human-led threat hunting service for uncovering hidden adversaries
Continuous threat hunting service based on TTP analysis and EDR exploitation
A community-driven open source project providing interactive notebooks with detection logic, adversary tradecraft, and resources organized according to MITRE ATT&CK framework for threat hunting and detection development.
Define and validate YARA rule metadata with CCCS YARA Specification.
A free web-based Yara debugger for security analysts to write hunting or detection rules with ease.
YARA signature and IOC database for LOKI and THOR Lite scanners with high quality rules and IOCs.
YLS Language Server for YARA Language with comprehensive features and Python 3.8 support.
A library of event-based analytics written in EQL to detect adversary behaviors identified in MITRE ATT&CK, providing detection rules for the Elastic Stack.
msticpy is a Python library for InfoSec investigation and threat hunting in Jupyter Notebooks, providing data querying, threat intelligence enrichment, analysis capabilities, and interactive visualizations.
Threat hunting tool leveraging Windows events for identifying outliers and suspicious behavior.
A framework for improving detection strategies and alert efficacy.
Repository of scripts, signatures, and IOCs related to various malware analysis topics.
Get strategic cybersecurity insights in your inbox