A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.
☆12Feb 26, 2024Updated 2 years ago
Alternatives and similar repositories for ThreatHunter-Playbook
Users that are interested in ThreatHunter-Playbook are comparing it to the libraries listed below
Sorting:
- Links to VeteranSec Resources☆11May 18, 2020Updated 5 years ago
- multi-threaded script uses VirusTotal and AbuseIPDB APIs and generate an excel with all needed data☆10Mar 14, 2023Updated 2 years ago
- CommandInWiFi: Exploiting SSID Storage in WiFi Scanning for Command Injection☆28Updated this week
- GPThreatIntel-Summarizer is a Python tool that uses OpenAI models and CTI to automate report summarization. Extract key insights from CTI…☆21Feb 6, 2024Updated 2 years ago
- ☆14Nov 16, 2024Updated last year
- ☆15Sep 17, 2022Updated 3 years ago
- Script to mass deauthenticate multiple wireless clients.☆12Jan 1, 2017Updated 9 years ago
- Query free badminton slots the easy way.☆10Mar 5, 2017Updated 9 years ago
- Host Discovery Tool☆10Jan 17, 2022Updated 4 years ago
- Deception implementation through analysis of BloodHound data☆53Oct 9, 2025Updated 4 months ago
- gRPC / gRPC-Web Pentest Practicing Lab☆10Aug 29, 2023Updated 2 years ago
- This tool is designed to seamlessly convert Postman collections into OpenAPI schemas. This conversion is essential for API security testi…☆12Sep 3, 2024Updated last year
- A Python based Recon Tool to search for Storage Buckets☆11Jan 21, 2023Updated 3 years ago
- Generic Signature Format for SIEM Systems☆14Oct 27, 2021Updated 4 years ago
- Web Crawler for Identifying Entry Points☆11Mar 26, 2024Updated last year
- Automated authorization checks with multiple headers tool written in golang☆11Jan 3, 2024Updated 2 years ago
- ☆11Oct 3, 2021Updated 4 years ago
- Azure DevOps is an end-to-end software development platform.☆13Aug 25, 2025Updated 6 months ago
- Neo-reGeorg is a project that seeks to aggressively refactor reGeorg☆10Dec 26, 2022Updated 3 years ago
- Indirect Prompt Injection Methodology (IPIM) - A structured process which security professionals can use to find Indirect Prompt Injectio…☆18Jul 28, 2025Updated 7 months ago
- I have created this dashboard to track oscp preparation. I have used several resources and has been mentioned in dashboard. Tjnull's blog…☆13Jul 8, 2022Updated 3 years ago
- Crappy shell script that port scans using curl☆13May 3, 2017Updated 8 years ago
- ☆12Jun 24, 2022Updated 3 years ago
- Official implementation of "Poisoning Attacks on Cyber Attack Detectors for Industrial Control Systems" by Moshe Kravchik, Battista Biggi…☆14Mar 22, 2021Updated 4 years ago
- Swift code to parse the quarantine history database, Chrome history database, Safari history database, and Firefox history database on ma…☆15Dec 3, 2020Updated 5 years ago
- Program to Inject a DLL into a process from memory.☆13Mar 16, 2024Updated last year
- AI modular structure that provides automation-based attack and penetration☆14May 10, 2024Updated last year
- Check Diffie Hellman group prime parameter☆11Jan 29, 2016Updated 10 years ago
- My OSCP cheat sheet☆22Aug 4, 2024Updated last year
- Arxiv + Notion Sync☆20May 12, 2025Updated 9 months ago
- Remote Potato Server - a free streaming server to stream all media on a PC to browsers, apps, etc☆24Jul 23, 2012Updated 13 years ago
- History of commits related to the xz backdoor Discovered On March 29, 2024: CVE-2024-3094.☆10Apr 1, 2024Updated last year
- This exploit is utilising AddressOfEntryPoint of process which is RX and using WriteProcessMemory internal magic to change the permission…☆18Oct 31, 2024Updated last year
- PoCs of (outdated) privilege escalation vulnerability☆12Dec 31, 2024Updated last year
- regex Hunter- Fast website endpoint sensitive data and Leaks JS files endpoint API Key Scraper☆12Jun 8, 2024Updated last year
- Image Payload Creating/Injecting tools☆13Jun 6, 2021Updated 4 years ago
- ☆12Oct 18, 2019Updated 6 years ago
- ☆19Mar 9, 2021Updated 4 years ago
- Training resources for LFCS certification (Linux Foundation Certified System Administrator)☆13Jul 26, 2015Updated 10 years ago