JouniMi / Threathunt.blogView external linksLinks
Queries from the blog posts.
☆15Oct 6, 2024Updated last year
Alternatives and similar repositories for Threathunt.blog
Users that are interested in Threathunt.blog are comparing it to the libraries listed below
Sorting:
- Programming Microsoft Sentinel book☆25Dec 13, 2023Updated 2 years ago
- ☆26May 25, 2023Updated 2 years ago
- Defender Resource Hub☆30Jan 5, 2026Updated last month
- One Day of Python for SaintCon 2022☆11Jan 3, 2023Updated 3 years ago
- ☆12Jun 9, 2021Updated 4 years ago
- Device Serial Number Import Tool for Intune Autopilot V2☆16Sep 8, 2025Updated 5 months ago
- The dataset was used as a support to attack obfuscations. It is the largest obfuscated dataset, with realistic and various binaries and f…☆19Jan 15, 2026Updated last month
- Sample data generator for the Splunk for Palo Alto Networks app.☆12Sep 25, 2016Updated 9 years ago
- A series of cloud focused KQL queries for threat hunting and DFIR☆11Oct 21, 2025Updated 3 months ago
- This is a script to import Cisco Talos's IP Blacklist into a Tag (Host Group) within Stealthwatch. This will also optionally create a Cu…☆11May 22, 2023Updated 2 years ago
- The Eureka Lab Series is designed for learners at all levels of experience and interest in security concepts and technologies.☆10Nov 30, 2025Updated 2 months ago
- Canadian threat feeds updated every 12 hours.☆20Updated this week
- Powershell scripts for differnet topics☆12Updated this week
- Detection rules and threat hunting queries in Defender XDR and Azure Sentinel☆16Updated this week
- Various dll hollowing techniques☆10Feb 29, 2024Updated last year
- Process doppelganging POC using direct system calls, PPID spoofing and dropbox as an external delivery channel for the payload.☆16Jan 7, 2021Updated 5 years ago
- (Unofficial) Python API for https://sslbl.abuse.ch/☆11Dec 9, 2016Updated 9 years ago
- 🦉🔬A small PowerShell tool for finding information quickly on malicious IPs or FQDNs. Powershell threat hunting.☆11Jan 9, 2020Updated 6 years ago
- A rust proof of concept to demonstrate registry overwriting via RegRestoreKey using the Offline Registry Library☆24Nov 13, 2025Updated 3 months ago
- Tools for hunting security threats☆12Feb 4, 2020Updated 6 years ago
- FileSigExtractor is a python based tool which extracts the file signatures of all files within a directory and writes the output to a CSV…☆10Jul 15, 2023Updated 2 years ago
- Tailscale System(d) (bootable) container for use with Podman Machine, Podman Desktop, MicroShift and OpenShift Local installations☆12Dec 30, 2024Updated last year
- Project to Support The Hunter's Framework (THF)☆11Apr 16, 2024Updated last year
- ☆10May 6, 2023Updated 2 years ago
- ☆12Jan 17, 2026Updated last month
- Quick module to deploy a Linux VM to Azure with Ansible installed at bootup - by @JesseLoudon☆11Dec 9, 2025Updated 2 months ago
- Technical cyber security resources across the NIST cyber security framework lifecycle☆11Apr 28, 2021Updated 4 years ago
- Draugnet is a lightweight, open-source tool for anonymous cyber threat reporting. Built for the MISP ecosystem, it lets users submit and …☆20Sep 2, 2025Updated 5 months ago
- ☆16Updated this week
- Cobalt Strike notifications via NTFY.☆15Sep 24, 2024Updated last year
- HoneyDB Python Module☆14Feb 6, 2024Updated 2 years ago
- Smart weather dashboard. Integrates with OpenWeatherMaps and Ecobee. Designed to run on RaspberryPi.☆15Aug 19, 2023Updated 2 years ago
- Offline Active Directory Domain Services (AD DS) Join☆12Jan 4, 2017Updated 9 years ago
- Detect common classes of XPC exploits☆15Dec 6, 2024Updated last year
- Basic boilerplate for web apps, MVC pattern.☆11Apr 16, 2019Updated 6 years ago
- GUI for regripper☆11Mar 19, 2019Updated 6 years ago
- Released presentations of my talks + code that used during these talks☆15Sep 5, 2024Updated last year
- Sigma to Wazuh rule converter☆17Sep 28, 2025Updated 4 months ago
- A tool to automate memory dump processing using Volatility, including optional Splunk integration.☆12Jul 29, 2020Updated 5 years ago