ATHF is a framework for agentic threat hunting - building systems that can remember, learn, and act with increasing autonomy.
☆213Mar 16, 2026Updated 2 weeks ago
Alternatives and similar repositories for agentic-threat-hunting-framework
Users that are interested in agentic-threat-hunting-framework are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆62Feb 12, 2026Updated last month
- poc for cve-2025-53772☆46Dec 10, 2025Updated 3 months ago
- Command and Control Framework using powershell implants☆36Jun 17, 2025Updated 9 months ago
- Fast Windows post-exploitation wins after initial access.☆29Jan 28, 2026Updated 2 months ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆39Sep 29, 2025Updated 6 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Command and Control that uses NTP as the transport protocol.☆25Jan 29, 2022Updated 4 years ago
- ☆10Sep 12, 2024Updated last year
- Forensic tool for extracting and analyzing Google DriveFS cached files and metadata.☆20May 9, 2025Updated 10 months ago
- Wordpress Plugin Canto < 3.0.5 - Remote File Inclusion (RFI) and Remote Code Execution (RCE)☆17Nov 24, 2023Updated 2 years ago
- AI-powered Windows Event Log analyzer that learns from your feedback. Uses Claude AI with RAG to detect suspicious activity, improve ac…☆36Dec 18, 2025Updated 3 months ago
- An interactive mock C2 server☆17Feb 25, 2023Updated 3 years ago
- The idea is simply to save some quick notes that will make it easier for Splunk users to leverage KQL (Kusto), especially giving projects…☆44Nov 7, 2020Updated 5 years ago
- Burpsuite Extension for Jsmon☆23Updated this week
- Browser Reviewer is a portable forensic tool for analyzing user activity in Firefox and Chrome-based browsers. It extracts and displays b…☆55Oct 10, 2025Updated 5 months ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Repository for CoSAI workstream 2, Preparing Defenders for a Changing Cybersecurity Landscape☆48Mar 11, 2026Updated 2 weeks ago
- ☆70Jan 18, 2026Updated 2 months ago
- ☆26Feb 5, 2024Updated 2 years ago
- my MSTICpy practice and custom tools repository☆11Apr 23, 2025Updated 11 months ago
- This project is an Ansible Role to execute Atomic Red Team tests against multiple machines by wrapping Invoke-AtomicRedTeam☆27Jul 4, 2024Updated last year
- Automated Cloud Misconfiguration Testing☆23Jun 20, 2025Updated 9 months ago
- ☆28Updated this week
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆34Mar 7, 2022Updated 4 years ago
- A virtual agent for your virtual books📚☆48May 18, 2025Updated 10 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- This is a tutorial and introduction to Reflective DLL Injection + reading outputs of injected dll using named pipes.☆20Feb 8, 2025Updated last year
- Method of finding interesting domains using keywords + JARMs☆13Jan 30, 2023Updated 3 years ago
- Splice and merge videos from the terminal☆25Oct 4, 2025Updated 5 months ago
- Wonka is a sweet Windows tool that extracts Kerberos tickets from the Local Security Authority (LSA) cache. Like finding a ticket, but fo…☆167Oct 21, 2025Updated 5 months ago
- The tool used to clone the digital signatures of legitimate programs☆59Oct 11, 2025Updated 5 months ago
- Information about most important hunts which can be performed by Threat hunters while searching for any adversary/threats inside the orga…☆15May 18, 2019Updated 6 years ago
- Open Source Security Operations Center Documentation☆212Jun 30, 2025Updated 9 months ago
- Security proxy for AI agents. Scans every message for prompt injection, PII, and secrets. Defense-in-depth: Go proxy + iptables firewall …☆118Mar 16, 2026Updated 2 weeks ago
- My Notes For OSCP☆36Mar 12, 2022Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Removes duplicate entries from a file, resulting in only unique parameter combinations. Useful for parsing waybackurls and making recon m…☆11May 31, 2020Updated 5 years ago
- A practical resource on using open-source tools for Incident Response. This repo shares workflows, tool setups, and steps for responding …☆38Nov 4, 2024Updated last year
- A TUI for Active Directory collection.☆134Mar 17, 2026Updated last week
- ☆15Sep 17, 2022Updated 3 years ago
- A python library for runtime validation and type checking of python values.☆10Aug 11, 2022Updated 3 years ago
- ☆26Aug 29, 2025Updated 7 months ago
- Not Another Code Injection Toolkit☆16Aug 19, 2021Updated 4 years ago