Nebulock-Inc / agentic-threat-hunting-frameworkLinks
ATHF is a framework for agentic threat hunting - building systems that can remember, learn, and act with increasing autonomy.
☆140Updated 3 weeks ago
Alternatives and similar repositories for agentic-threat-hunting-framework
Users that are interested in agentic-threat-hunting-framework are comparing it to the libraries listed below
Sorting:
- A knowledge source about TTPs used to target GenAI-based systems, copilots and agents☆131Updated 2 weeks ago
- Proximity is a MCP security scanner powered with NOVA☆269Updated 3 months ago
- Raw data from Threat Intelligence Reports with automatic reports collection and keyword search across thousands of reports☆145Updated this week
- CRADLE is a collaborative platform for Cyber Threat Intelligence analysts. It streamlines threat investigations with integrated note-taki…☆334Updated 2 weeks ago
- AI-powered subdomain enumeration tool with local LLM analysis via Ollama - 100% private, zero API costs☆186Updated last month
- Inboxfuscation is an advanced offensive & defensive framework for mailbox rule obfuscation and detection in Exchange environments.☆80Updated 3 months ago
- A tool for mapping cyber crime☆233Updated 8 months ago
- This is a repository to experiment with MCP for security☆45Updated 11 months ago
- A curated collection of DFIR skills and workflows for InfoSec practitioners.☆179Updated last week
- AI / LLM Red Team Field Manual & Consultant’s Handbook☆219Updated this week
- b3acon - a mail-based C2 that communicates via an in-memory C# IMAP client dynamically compiled in memory using PowerShell.☆43Updated 8 months ago
- Framework for Monitoring File Ingestion Source for Yara Matches☆50Updated 9 months ago
- ☆223Updated 2 weeks ago
- This is the repository for indicators of compromise (IOCs) and other data for threat intelligence articles posted on the Palo Alto Networ…☆109Updated last month
- EVA is an AI-assisted penetration testing agent that enhances offensive security workflows by providing structured attack guidance, conte…☆261Updated last week
- SECurityTr8Ker monitors the SEC's RSS feed for 8-K filings with cybersecurity incident disclosures.☆90Updated 6 months ago
- ☆68Updated 5 months ago
- Complete AI-powered security training with 40+ labs, CTF challenges, and realistic DFIR datasets. Learn ML threat detection, LLM analysis…☆46Updated this week
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆150Updated last year
- 🛡️ VIPER: Stay ahead of threats with AI-driven vulnerability intelligence. Prioritize CVEs effectively using NVD, EPSS, CISA KEV, and Go…☆81Updated 4 months ago
- Protection against HTML smuggling attacks.☆100Updated 5 months ago
- Mapping of open-source detection rules and atomic tests.☆193Updated 11 months ago
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆128Updated 9 months ago
- Cyber threat intelligence tool suite.☆42Updated 9 months ago
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆31Updated last year
- Ludus FastMCP enables AI-powered management of Ludus cyber ranges through natural language commands. The server exposes **157 tools** acr…☆65Updated last week
- Finding ClickFix and FakeCAPTCHA like it's 1999☆117Updated this week
- TTPMapper is an AI-driven threat intelligence parser that converts unstructured reports whether from web URLs or PDF files into structure…☆48Updated 6 months ago
- An index of publicly available and open-source threat detection rulesets.☆132Updated 8 months ago
- Have you ever wanted to search a link or IP address on multiple OSINT pages at once?☆59Updated 6 months ago