Short deep dive into Threat Hunting on AWS
☆18Oct 15, 2023Updated 2 years ago
Alternatives and similar repositories for aws-threat-hunting
Users that are interested in aws-threat-hunting are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Easily create Splunk searches from Python and get the result as a Python object.☆14May 30, 2024Updated last year
- A catalog of services that can be publicly exposed within different cloud providers.☆14Aug 30, 2024Updated last year
- ☆37Aug 23, 2022Updated 3 years ago
- Offensive Terraform module which copies publicly exposed EBS snapshot to us-east-1 region in attacker's AWS account and creates EBS volum…☆14Sep 18, 2020Updated 5 years ago
- Alternative password shadowing scheme☆10Feb 22, 2026Updated last month
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ☆11Feb 9, 2023Updated 3 years ago
- 🌌 Real-time threat detection for smart contracts☆10May 16, 2023Updated 2 years ago
- This directory contains random scripts from threat hunting or malware research☆11Feb 15, 2018Updated 8 years ago
- Sigma detection rules for hunting with the threathunting-keywords project☆59Mar 2, 2025Updated last year
- CLI Search for Security Operators of MITRE ATT&CK URLs☆17Jan 5, 2023Updated 3 years ago
- The Enhanced MITRE ATT&CK® Coverage Tracker is an Excel tool for SOCs to measure and improve detection coverage of cyber threats. It simp…☆34Nov 13, 2025Updated 4 months ago
- Generate representative samples from Pwned Passwords (HIBP)☆11Jan 6, 2022Updated 4 years ago
- Perform file-based malware scan on your on-prem servers with AWS☆14Oct 31, 2023Updated 2 years ago
- Queries for Carbon Black Response☆11Feb 11, 2020Updated 6 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Evil Inject Finder Remote Capability and Parser☆11Nov 22, 2018Updated 7 years ago
- PowerShell version of Fail2Ban☆13Oct 10, 2019Updated 6 years ago
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆60Mar 12, 2022Updated 4 years ago
- Test Suite for John the Ripper☆25Dec 28, 2025Updated 3 months ago
- ☆375Feb 23, 2024Updated 2 years ago
- Quick script to build host or investigation timelines using Carbon Black Response☆12Sep 25, 2018Updated 7 years ago
- Small container runtime for threat detection☆14Apr 13, 2025Updated 11 months ago
- yara detection rules for hunting with the threathunting-keywords project☆157May 11, 2025Updated 10 months ago
- Implementation of bcrypt password hashing scheme☆12Jan 11, 2021Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- An SSH honeypot written entirely in Go.☆13Dec 4, 2025Updated 3 months ago
- ☆154Updated this week
- Detection rules and threat hunting queries in Defender XDR and Azure Sentinel☆16Mar 13, 2026Updated 2 weeks ago
- Threat Detection Rules (Snort/Sigma/Yara)☆14Jan 23, 2024Updated 2 years ago
- Lists of Dynamic DNS Domains/FQDNs as well as lists of services/providers that offer free dynamic dns domains.☆13Nov 2, 2021Updated 4 years ago
- 威胁检测规则集☆15Jul 5, 2019Updated 6 years ago
- ☆31Feb 10, 2023Updated 3 years ago
- Scripts and Modules for forensical analyses of mysql database systems☆22Sep 19, 2014Updated 11 years ago
- ☆11Apr 21, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Small and highly portable detection tests based on MITRE's ATT&CK.☆12Jun 24, 2021Updated 4 years ago
- ThreatSeeker: Threat Hunting via Windows Event Logs☆124May 16, 2023Updated 2 years ago
- A script used to query the dehashed API and filter for more useful results☆16Jun 20, 2021Updated 4 years ago
- CSV Manager for AWS Security Hub exports SecurityHub findings to a CSV file and allows you to mass-update SecurityHub findings by modifyi…☆17Jul 23, 2025Updated 8 months ago
- Cyber Threats Detection Rules☆14Sep 16, 2025Updated 6 months ago
- ☆14Jul 21, 2024Updated last year
- Virtual machines that are set up with a variety of known vulnerabilities.☆17Mar 1, 2022Updated 4 years ago