Open Threat Hunting Framework
☆126May 26, 2023Updated 2 years ago
Alternatives and similar repositories for OTHF
Users that are interested in OTHF are comparing it to the libraries listed below
Sorting:
- Threat Hunting is time consuming enough as it is. Coming up with and tracking metrics to justify your hunt team to the Execs often takes…☆13Dec 7, 2022Updated 3 years ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- ☆71Jun 20, 2023Updated 2 years ago
- Slides of my public talks☆63Feb 20, 2026Updated last month
- A public repository of MITRE ATT&ACK TTP mappings by BushidoUK for OSINT reports that lack a section breaking down the TTPs.☆27Mar 20, 2025Updated last year
- This is a repository for reporting any issues in any of my software☆13May 15, 2018Updated 7 years ago
- ☆11May 2, 2022Updated 3 years ago
- Common framework for designing a detection and response framework for the most common MFT solutions☆16Aug 4, 2023Updated 2 years ago
- A list of RMMs designed to be used in automation to build alerts☆117Nov 9, 2025Updated 4 months ago
- ☆10Jul 1, 2023Updated 2 years ago
- A collection of Sigma rules organized by MITRE ATT&CK technique☆18Jul 26, 2021Updated 4 years ago
- A repository of my own Sigma detection rules.☆163Nov 25, 2025Updated 3 months ago
- Beginners Guide to Hunting for Threats☆18Apr 26, 2025Updated 10 months ago
- Placeholder for my detection repo and misc detection engineering content☆42Oct 20, 2023Updated 2 years ago
- Various commands, tools, techniques that you can use to examine live Windows systems for signs of Compromise or for Threat Hunting.Can al…☆14Aug 15, 2022Updated 3 years ago
- A collection of small scripts and tools for deobfuscation and malware analysis.☆67Mar 27, 2023Updated 2 years ago
- PS-TrustedDocuments: PowerShell script to handle information on trusted documents for Microsoft Office☆37Mar 15, 2023Updated 3 years ago
- ☆22Dec 22, 2020Updated 5 years ago
- Collection of Event ID ressources useful for Digital Forensics and Incident Response☆644Jun 19, 2024Updated last year
- ☆225Sep 8, 2022Updated 3 years ago
- Cyber Range including Velociraptor + HELK system with a Windows VM for security testing and R&D. Azure and AWS terraform support.☆145Nov 2, 2022Updated 3 years ago
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆60Mar 12, 2022Updated 4 years ago
- Threat Hunting & Incident Investigation with Osquery☆216Mar 30, 2022Updated 3 years ago
- ShellSweeping the evil.☆181Nov 25, 2024Updated last year
- ☆21Jul 29, 2019Updated 6 years ago
- ALFA stands for Automated Audit Log Forensic Analysis for Google Workspace. You can use this tool to acquire all Google Workspace audit l…☆173Mar 2, 2026Updated 2 weeks ago
- Jupyter notebooks for threat hunting☆60Mar 26, 2025Updated 11 months ago
- A repository to share publicly available Velociraptor detection content☆196Mar 8, 2026Updated last week
- UAC is a powerful and extensible incident response tool designed for forensic investigators, security analysts, and IT professionals. It …☆1,255Updated this week
- Detection Ideas & Rules repository.☆178Sep 10, 2021Updated 4 years ago
- ReversingLabs YARA Rules☆900Nov 3, 2025Updated 4 months ago
- A simple command line program to help defender test their detections for network beacon patterns and domain fronting☆70Feb 3, 2022Updated 4 years ago
- The goal of this repo is to archive artifacts from all versions of various OS's and categorizing them by type. This will help with artifa…☆648Nov 7, 2025Updated 4 months ago
- ThreatHunt is a PowerShell repository that allows you to train your threat hunting skills.☆135Jul 25, 2019Updated 6 years ago
- A not so awesome list of adversary emulation gems for aspiring red/blue/purple teamers☆16Jul 19, 2022Updated 3 years ago
- BlackBerry Threat Research & Intelligence☆100Oct 20, 2023Updated 2 years ago
- ☆39Jun 28, 2019Updated 6 years ago
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.☆339Updated this week
- Small web frontend for using openAI's GPT-3.5 and GPT-4's API☆59Apr 9, 2025Updated 11 months ago