Strelka Logo

Strelka

0
Free
Visit Website

Strelka is a real-time, container-based file scanning system used for threat hunting, threat detection, and incident response. Originally based on the design established by Lockheed Martin's Laika BOSS and similar projects (see: related projects), Strelka's purpose is to perform file extraction and metadata collection at enterprise scale. Strelka differs from its sibling projects in a few significant ways: Core codebase is Go and Python3.10+ Server components run in containers for ease and flexibility of deployment OS-native client applications for Windows, Mac, and Linux Built using libraries and formats that allow cross-platform, cross-language support Features Strelka is a modular data scanning platform, allowing users or systems to submit files for the purpose of analyzing, extracting, and reporting file content and metadata. Coupled with a SIEM, Strelka is able to aggregate, alert, and provide analysts with the capability to better understand their environment without having to perform direct data gathering or time-consuming file analysis. Quickstart Running a file through Strelka is simple. In this section, Strelka capabilities are showcased.

FEATURES

ALTERNATIVES

A database of Tor exit nodes with their corresponding IP addresses and timestamps.

Collect various intelligence sources for hosts in CSV format.

A library of Amazon S3 attack scenarios with mitigation strategies.

A simple, self-contained modular host-based IOC scanner for incident responders.

Aggregates security threats from online sources and outputs to various formats.

A tool for navigating and annotating ATT&CK matrices with the ability to define custom layers for specific views.

Repository of Yara Rules created by TjNel.

RogueApps is a collaborative repository documenting TTPs of malicious OIDC/OAuth 2.0 applications for cybersecurity research and awareness.

PINNED