A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.
☆12Feb 26, 2024Updated 2 years ago
Alternatives and similar repositories for ThreatHunter-Playbook
Users that are interested in ThreatHunter-Playbook are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A project that aims to automate Volatility3 at scale with the use of cloud strength and the power of KQL inside ADX.☆16Aug 19, 2025Updated 8 months ago
- ☆15Sep 17, 2022Updated 3 years ago
- Links to VeteranSec Resources☆12May 18, 2020Updated 5 years ago
- Solución de análisis y visualización forense para archivos incrementales de WhatsApp, incluyendo recuperación de mensajes eliminados y re…☆35Apr 5, 2026Updated last month
- Browser interface to Telegram's API with additional modules for generating datasets and network graphs☆13Dec 31, 2023Updated 2 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- ☆12Dec 4, 2023Updated 2 years ago
- Escape from the Forest is an AI-powered text adventure game inspired by a Rick and Morty skit, featuring an old-school terminal appearanc…☆10May 1, 2023Updated 3 years ago
- Python script to walk a folder or a zip file for SQLite Databases☆37Sep 20, 2023Updated 2 years ago
- Training resources for LFCS certification (Linux Foundation Certified System Administrator)☆13Jul 26, 2015Updated 10 years ago
- A Python based Recon Tool to search for Storage Buckets☆11Jan 21, 2023Updated 3 years ago
- Crappy shell script that port scans using curl☆13May 3, 2017Updated 9 years ago
- History of commits related to the xz backdoor Discovered On March 29, 2024: CVE-2024-3094.☆10Apr 1, 2024Updated 2 years ago
- Pythonic interface to the Internet Storm Center / DShield API.☆28May 23, 2023Updated 2 years ago
- An ongoing collection of Go tools and frameworks, software, libraries, learning tutorials, frameworks, academic and practical resources.☆25Mar 20, 2022Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆17Oct 21, 2023Updated 2 years ago
- multi-threaded script uses VirusTotal and AbuseIPDB APIs and generate an excel with all needed data☆10Mar 14, 2023Updated 3 years ago
- Swift code to parse the quarantine history database, Chrome history database, Safari history database, and Firefox history database on ma…☆16Dec 3, 2020Updated 5 years ago
- Program to Inject a DLL into a process from memory.☆13Mar 16, 2024Updated 2 years ago
- Neo-reGeorg is a project that seeks to aggressively refactor reGeorg☆10Dec 26, 2022Updated 3 years ago
- Case_Notes.py is a cross-platform (Windows, macOS, & Linux) python script to help make the documentation process easier.☆26Jun 24, 2023Updated 2 years ago
- GPThreatIntel-Summarizer is a Python tool that uses OpenAI models and CTI to automate report summarization. Extract key insights from CTI…☆21Feb 6, 2024Updated 2 years ago
- Python code to use different APIs which can help in your OSINT efforts☆27Apr 16, 2024Updated 2 years ago
- Script to mass deauthenticate multiple wireless clients.☆12Jan 1, 2017Updated 9 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- My OSCP cheat sheet☆22Aug 4, 2024Updated last year
- Jupyter Univere is a search engine for all infosec jupyter notebooks☆37Mar 24, 2025Updated last year
- ☆12Oct 18, 2019Updated 6 years ago
- CISSP Certification Exam Prep☆21Dec 14, 2025Updated 4 months ago
- A MEMORY DUMP OF C PROGRAMMING, by Sean Eyre (@oni49) and Stephen Semmelroth (@stephensemmelroth / @diodepack) of Rainier Cyber (acquired…☆18Apr 5, 2021Updated 5 years ago
- Official implementation of "Poisoning Attacks on Cyber Attack Detectors for Industrial Control Systems" by Moshe Kravchik, Battista Biggi…☆14Mar 22, 2021Updated 5 years ago
- Host Discovery Tool☆10Jan 17, 2022Updated 4 years ago
- Deception implementation through analysis of BloodHound data☆59Mar 30, 2026Updated last month
- This tool is designed to seamlessly convert Postman collections into OpenAPI schemas. This conversion is essential for API security testi…☆12Sep 3, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆11Oct 3, 2021Updated 4 years ago
- A landing page for great justice☆21Sep 1, 2025Updated 8 months ago
- 💫 An AI-powered coding assistant, built to try out the ChatGPT API☆52Apr 15, 2023Updated 3 years ago
- Remote Potato Server - a free streaming server to stream all media on a PC to browsers, apps, etc☆24Jul 23, 2012Updated 13 years ago
- 🧱 CrewNews is an AI news generator that delivers an unbiased version of the news for a given topic, using Streamlit for the GUI, Llama 3…☆38Nov 30, 2024Updated last year
- This exploit is utilising AddressOfEntryPoint of process which is RX and using WriteProcessMemory internal magic to change the permission…☆18Oct 31, 2024Updated last year
- Simulate Windows EXE for Malware Research!☆20Sep 4, 2024Updated last year