☆35Jun 22, 2021Updated 4 years ago
Alternatives and similar repositories for openhunt
Users that are interested in openhunt are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Generic Signature Format for SIEM Systems☆14Oct 27, 2021Updated 4 years ago
- A virtual MediaWiki development environment, built on Vagrant, VirtualBox, and Puppet.☆16Dec 1, 2016Updated 9 years ago
- 威胁检测规则集☆15Jul 5, 2019Updated 6 years ago
- Shared yara rules☆30Mar 17, 2014Updated 12 years ago
- Repository resource threat intelligence for SOC☆10Sep 14, 2018Updated 7 years ago
- A collection of notebooks built for defensive and offensive operations.☆77Oct 13, 2020Updated 5 years ago
- OpenControl Database☆11Jan 5, 2023Updated 3 years ago
- A Docker container for Moloch based on minimal Debian☆13Jun 23, 2017Updated 8 years ago
- OASIS TC Open Repository: Non-normative schemas and examples for STIX 2☆135Jan 19, 2026Updated 2 months ago
- Kestrel Jupyter Notebook Kernel☆10Oct 19, 2023Updated 2 years ago
- Tachikoma is a security alerting framework for human beings☆22Sep 7, 2018Updated 7 years ago
- This content is analysis and research of the data sources currently listed in ATT&CK.☆413Sep 13, 2023Updated 2 years ago
- A collection of curated Java Deserialization Exploits☆11May 22, 2018Updated 7 years ago
- Alternative password shadowing scheme☆10Feb 22, 2026Updated last month
- Gather Open-Source Intelligence using PowerShell.☆179Oct 20, 2019Updated 6 years ago
- ☆11Feb 9, 2023Updated 3 years ago
- Threat Intel and Incident Reponse☆10Aug 29, 2018Updated 7 years ago
- Modular malware analysis artifact collection and correlation framework☆54Apr 23, 2024Updated last year
- Indicators of Compromise (IOCs) accompanying HP Threat Research blog posts and reports.☆29Apr 10, 2024Updated last year
- Random hunting ordiented yara rules☆96Mar 27, 2023Updated 2 years ago
- OSCAL SSP content for technologies shipped by Red Hat☆16Mar 2, 2023Updated 3 years ago
- Collection of Jupyter Notebook for Threat Hunting and Blue Team Purposes☆22Jun 15, 2022Updated 3 years ago
- OASIS TC Open Repository: Match STIX content against STIX patterns☆46Aug 1, 2022Updated 3 years ago
- A community event for security researchers to share their favorite notebooks☆108Feb 15, 2024Updated 2 years ago
- The Infosec Community Definitive Guide to Jupyter Notebooks☆132Oct 17, 2020Updated 5 years ago
- Threat Detection & Anomaly Detection rules for popular open-source components☆53Jul 27, 2022Updated 3 years ago
- A curated list of resources to deep dive into the intersection of applied machine learning and threat detection.☆19Sep 23, 2020Updated 5 years ago
- Actionable analytics designed to combat threats based on MITRE's ATT&CK.☆23Aug 21, 2019Updated 6 years ago
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆48Nov 11, 2022Updated 3 years ago
- This directory contains random scripts from threat hunting or malware research☆11Feb 15, 2018Updated 8 years ago
- Signature engine for all your logs☆173Nov 13, 2023Updated 2 years ago
- 用nmap 和 elk 做内网资产盘点,依赖 nmap-vulners☆28Apr 29, 2020Updated 5 years ago
- A project to attempt to automatically login to a website given a single seed☆11Jun 17, 2024Updated last year
- Deploys Zeek on Google Cloud☆27Feb 24, 2026Updated last month
- Generates YARA rules to detect malware using API hashing☆17Mar 16, 2021Updated 5 years ago
- CLI Search for Security Operators of MITRE ATT&CK URLs☆17Jan 5, 2023Updated 3 years ago
- ETHICAL-HACKING☆12Dec 20, 2023Updated 2 years ago
- ☆39Mar 2, 2026Updated 3 weeks ago
- Performs OCR on image files and scans them for matches to YARA rules☆42Oct 30, 2018Updated 7 years ago