☆68May 13, 2022Updated 3 years ago
Alternatives and similar repositories for ThreatHuntingJupyterNotebooks
Users that are interested in ThreatHuntingJupyterNotebooks are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Collection of Jupyter Notebook for Threat Hunting and Blue Team Purposes☆22Jun 15, 2022Updated 3 years ago
- Repository with Sample threat hunting notebooks on Security Event Log Data Sources☆69Dec 2, 2022Updated 3 years ago
- ☆11Jun 12, 2023Updated 2 years ago
- ☆12Jun 29, 2021Updated 4 years ago
- Cheat sheets for threat hunting, detection and other stuff.☆34Oct 7, 2022Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆12Mar 28, 2026Updated 3 weeks ago
- Tool for analysis of Windows Prefetch files☆26Nov 11, 2018Updated 7 years ago
- Currently proof-of-concept☆17Dec 17, 2021Updated 4 years ago
- This Repository gives the best and possible strategies against hunting the ransomware☆26Aug 23, 2022Updated 3 years ago
- Various commands, tools, techniques that you can use to examine live Windows systems for signs of Compromise or for Threat Hunting.Can al…☆15Aug 15, 2022Updated 3 years ago
- Powershell collection designed to assist in Threat Hunting Windows systems.☆27Apr 13, 2018Updated 8 years ago
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆154Apr 25, 2022Updated 3 years ago
- Collection of scripts / samples / snippits around the community service at www.filescan.io☆17Nov 6, 2025Updated 5 months ago
- Repository for threat hunting and detection queries, etc. for Defender for Endpoint and Microsoft Sentinel in KQL(Kusto Query Language).☆810Jan 14, 2026Updated 3 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ATT&CK Remote Threat Hunting Incident Response☆206Dec 8, 2024Updated last year
- Device profile: Define acceptable amounts of traffic for your devices and see a report of outliers.☆16Jan 28, 2020Updated 6 years ago
- Library of functions to apply Data Science in several forensics artifacts☆41Aug 19, 2024Updated last year
- Mindmaps for threat hunting - work in progress.☆152Mar 15, 2022Updated 4 years ago
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆209Jul 21, 2022Updated 3 years ago
- A Canary which fires when uninstalled☆34Mar 16, 2021Updated 5 years ago
- This project documents how to analyze cybersecurity data with machine learning tools and techniques in python. The tutorials run in Jupy…☆26Oct 28, 2017Updated 8 years ago
- This is a threat intelligence automatic crawling tool that also contains some high-value threat intelligence.☆21Jun 2, 2021Updated 4 years ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆38Oct 15, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Simulates a compromise in a cloud and container environment☆34Dec 18, 2024Updated last year
- This repository hosts community contributed Kestrel huntflows (.hf) and huntbooks (.ipynb)☆37Jan 2, 2024Updated 2 years ago
- This Repository consists all Public Cheatsheets created by BlackPerl DFIR Content Team☆20Oct 9, 2024Updated last year
- MCP to help Defenders Detection Engineer Harder and Smarter☆403Updated this week
- http://moaistory.blogspot.com/2016/08/ie10analyzer.html☆20Jul 20, 2024Updated last year
- Detecting Cobalt Strike Team Servers on targets through traffic telemetry.☆22Aug 13, 2024Updated last year
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Apr 10, 2020Updated 6 years ago
- Threat Hunting with Elastic Stack, Published by Packt☆41Mar 2, 2026Updated last month
- YAFRA is a semi-automated framework for analyzing and representing reports about IT Security incidents.☆27Dec 14, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- The official Prelude SIEM GitHub of https://www.prelude-siem.org☆42Jun 12, 2016Updated 9 years ago
- Template to detect some malware☆14Aug 7, 2023Updated 2 years ago
- Purpleteam scripts simulation & Detection - trigger events for SOC detections☆196Dec 20, 2024Updated last year
- Domain Response is a tool that is designed to help you automate the investigation for a domain. This tool is specificly designed to autom…☆50Jan 1, 2026Updated 3 months ago
- Example agents for the Dreadnode platform☆31Dec 19, 2025Updated 3 months ago
- A simple vulnerable webapp created by PHP☆14Apr 18, 2025Updated last year
- A collection of various SIEM rules relating to malware family groups.☆69Jun 18, 2024Updated last year