Open Threat Hunting Framework
☆126May 26, 2023Updated 2 years ago
Alternatives and similar repositories for OTHF
Users that are interested in OTHF are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Threat Hunting is time consuming enough as it is. Coming up with and tracking metrics to justify your hunt team to the Execs often takes…☆13Dec 7, 2022Updated 3 years ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- ☆73Jun 20, 2023Updated 2 years ago
- Slides of my public talks☆63Feb 20, 2026Updated last month
- A public repository of MITRE ATT&ACK TTP mappings by BushidoUK for OSINT reports that lack a section breaking down the TTPs.☆26Mar 20, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Cyber Threat Intelligence☆78Dec 7, 2025Updated 4 months ago
- This is a repository for reporting any issues in any of my software☆13May 15, 2018Updated 7 years ago
- ☆12May 2, 2022Updated 3 years ago
- Common framework for designing a detection and response framework for the most common MFT solutions☆16Aug 4, 2023Updated 2 years ago
- A list of RMMs designed to be used in automation to build alerts☆117Nov 9, 2025Updated 5 months ago
- ☆10Jul 1, 2023Updated 2 years ago
- A collection of Sigma rules organized by MITRE ATT&CK technique☆18Apr 1, 2026Updated last week
- A repository of my own Sigma detection rules.☆164Nov 25, 2025Updated 4 months ago
- Beginners Guide to Hunting for Threats☆19Apr 26, 2025Updated 11 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Placeholder for my detection repo and misc detection engineering content☆42Oct 20, 2023Updated 2 years ago
- Various commands, tools, techniques that you can use to examine live Windows systems for signs of Compromise or for Threat Hunting.Can al…☆15Aug 15, 2022Updated 3 years ago
- A collection of small scripts and tools for deobfuscation and malware analysis.☆67Mar 27, 2023Updated 3 years ago
- PS-TrustedDocuments: PowerShell script to handle information on trusted documents for Microsoft Office☆37Mar 15, 2023Updated 3 years ago
- ☆22Dec 22, 2020Updated 5 years ago
- Collection of Event ID ressources useful for Digital Forensics and Incident Response☆643Jun 19, 2024Updated last year
- ☆223Sep 8, 2022Updated 3 years ago
- Cyber Range including Velociraptor + HELK system with a Windows VM for security testing and R&D. Azure and AWS terraform support.☆144Nov 2, 2022Updated 3 years ago
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆60Mar 12, 2022Updated 4 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Threat Hunting & Incident Investigation with Osquery☆217Mar 30, 2022Updated 4 years ago
- ShellSweeping the evil.☆181Nov 25, 2024Updated last year
- ☆21Jul 29, 2019Updated 6 years ago
- ALFA stands for Automated Audit Log Forensic Analysis for Google Workspace. You can use this tool to acquire all Google Workspace audit l…☆176Mar 2, 2026Updated last month
- Jupyter notebooks for threat hunting☆60Updated this week
- A repository to share publicly available Velociraptor detection content☆199Mar 29, 2026Updated last week
- UAC is a powerful and extensible incident response tool designed for forensic investigators, security analysts, and IT professionals. It …☆1,288Mar 28, 2026Updated last week
- Detection Ideas & Rules repository.☆178Sep 10, 2021Updated 4 years ago
- A simple command line program to help defender test their detections for network beacon patterns and domain fronting☆70Feb 3, 2022Updated 4 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ReversingLabs YARA Rules☆900Nov 3, 2025Updated 5 months ago
- The goal of this repo is to archive artifacts from all versions of various OS's and categorizing them by type. This will help with artifa…☆648Nov 7, 2025Updated 5 months ago
- ThreatHunt is a PowerShell repository that allows you to train your threat hunting skills.☆135Jul 25, 2019Updated 6 years ago
- A not so awesome list of adversary emulation gems for aspiring red/blue/purple teamers☆16Jul 19, 2022Updated 3 years ago
- BlackBerry Threat Research & Intelligence☆99Oct 20, 2023Updated 2 years ago
- ☆39Jun 28, 2019Updated 6 years ago
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.☆341Apr 1, 2026Updated last week