How can you track the hunting techniques you come up with?
☆13Sep 3, 2017Updated 8 years ago
Alternatives and similar repositories for HT-Trackr
Users that are interested in HT-Trackr are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Using osquery for Mass Incident Detection & Response☆19Jun 25, 2016Updated 9 years ago
- Recon scripts for bug hunting☆10Nov 19, 2021Updated 4 years ago
- Command-line Interface for Binar.ly☆39Jan 13, 2017Updated 9 years ago
- Python wrapper for the Mitre ATT&CK framework API☆31Mar 12, 2018Updated 8 years ago
- Spam trap management☆24Jun 18, 2024Updated last year
- Honeybadger Red Edition☆13Sep 13, 2017Updated 8 years ago
- Public Landing Page☆16Jan 7, 2023Updated 3 years ago
- Deploy MISP Project software with Vagrant.☆45Jun 15, 2020Updated 5 years ago
- IOC Management and Visualization Tool☆48Dec 8, 2022Updated 3 years ago
- A Model Context Protocol (MCP) server that integrates Volatility 3 memory forensics framework with Claude☆32Jul 7, 2025Updated 8 months ago
- My personal experience in Threat Hunting and knowledge gained so far.☆19May 27, 2017Updated 8 years ago
- Zeek scripting language highlighting/support for Sublime Text☆19Jul 20, 2021Updated 4 years ago
- Sysmon Splunk App☆47Aug 21, 2018Updated 7 years ago
- Contributed Bro Scripts☆30May 28, 2014Updated 11 years ago
- Simple Windows Event Log Forwarder (SWELF). Its easy to use/simply works Log Forwarder and EVTX Parser. Almost in full release here at ht…☆24Jun 20, 2023Updated 2 years ago
- Prototype for an in memory fuzzer☆13Aug 1, 2017Updated 8 years ago
- threadmap plugin for Volatility Foundation☆27Aug 23, 2021Updated 4 years ago
- Shellcode异或加密工具☆12Mar 23, 2017Updated 9 years ago
- DomainClassifier is a Python (2/3) library to extract and classify Internet domains/hostnames/IP addresses from raw unstructured text fil…☆80Jan 31, 2024Updated 2 years ago
- Work files for my blog post "Code Caving in a PE file.☆16Dec 18, 2016Updated 9 years ago
- This repository contains all the config files and scripts used for our Open Source Endpoint monitoring project.☆35Jul 8, 2019Updated 6 years ago
- Windows version of honeybits - a PoC tool to create breadcrumbs and honeytokens, to lead the attackers to your honeypots!☆25Jun 19, 2017Updated 8 years ago
- Various exploits☆10Apr 27, 2017Updated 8 years ago
- Clean public password dump files and store in ELK☆36Jan 24, 2018Updated 8 years ago
- BONOMEN - Hunt for Malware Critical Process Impersonation☆50Nov 30, 2020Updated 5 years ago
- A tool to perform various OSINT techniques, aggregate all the raw data, visualise it on a dashboard, and facilitate alerting and monitori…☆31Apr 22, 2018Updated 7 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Jun 4, 2013Updated 12 years ago
- D4 core software (server and sample sensor client)☆43Dec 23, 2023Updated 2 years ago
- Source code for the experimental, compact "wee" file compression utility.☆13May 8, 2020Updated 5 years ago
- 🏦 Finance utility for Bitstamp☆14Sep 10, 2017Updated 8 years ago
- An automated collection and analysis of malware from my honeypots.☆25Feb 8, 2018Updated 8 years ago
- A nodejs web application honeypot☆47Aug 23, 2015Updated 10 years ago
- Create shellcode from executable or assembly code☆12Jul 31, 2017Updated 8 years ago
- just a basic rootkit for learning how to playing sys_call_table☆16Sep 12, 2016Updated 9 years ago
- 收集各种各样的exp☆11Aug 20, 2015Updated 10 years ago
- Qt调用大漠插件☆10Oct 5, 2016Updated 9 years ago
- A Yara rule generator for finding related samples and hunting☆162Sep 11, 2022Updated 3 years ago
- ☆14Dec 5, 2014Updated 11 years ago
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Dec 10, 2017Updated 8 years ago