TeMiroYteHasheo / The-Hunters-FrameworkView external linksLinks
Project to Support The Hunter's Framework (THF)
☆11Apr 16, 2024Updated last year
Alternatives and similar repositories for The-Hunters-Framework
Users that are interested in The-Hunters-Framework are comparing it to the libraries listed below
Sorting:
- Official documentation for TheHive Project applications☆21Sep 29, 2023Updated 2 years ago
- ☆20May 10, 2023Updated 2 years ago
- Event Logging is an XML Schema for describing the auditable events generated by computer systems, hardware devices and access control sys…☆25Apr 24, 2025Updated 9 months ago
- One Day of Python for SaintCon 2022☆11Jan 3, 2023Updated 3 years ago
- REST server that can analyze Kusto KQL queries against the Sentinel and Microsoft 365 Defender schemas.☆50Sep 22, 2025Updated 4 months ago
- PS-TrustedDocuments: PowerShell script to handle information on trusted documents for Microsoft Office☆37Mar 15, 2023Updated 2 years ago
- Parses BGP/AS data from multiple different sources☆11Dec 4, 2021Updated 4 years ago
- Cybersecurity Psychology Framework☆19Feb 8, 2026Updated last week
- A Self-Contained Open-Source Cyberattack Experimentation Testbed☆43Jun 5, 2025Updated 8 months ago
- This is a script to import Cisco Talos's IP Blacklist into a Tag (Host Group) within Stealthwatch. This will also optionally create a Cu…☆11May 22, 2023Updated 2 years ago
- The dataset was used as a support to attack obfuscations. It is the largest obfuscated dataset, with realistic and various binaries and f…☆19Jan 15, 2026Updated last month
- CloudDefense.ai is an automated web application security testing tool that audits your web applications by checking for vulnerabilities l…☆49Nov 10, 2025Updated 3 months ago
- Sample data generator for the Splunk for Palo Alto Networks app.☆12Sep 25, 2016Updated 9 years ago
- Serialize ngraph.graph to binary format☆10Oct 9, 2025Updated 4 months ago
- The Eureka Lab Series is designed for learners at all levels of experience and interest in security concepts and technologies.☆10Nov 30, 2025Updated 2 months ago
- CLI to control Pioneer CDJ devices☆11Mar 22, 2025Updated 10 months ago
- Queries from the blog posts.☆15Oct 6, 2024Updated last year
- A collection of tools for managing and automating vulnerability management.☆13Mar 24, 2022Updated 3 years ago
- ☆11Dec 17, 2024Updated last year
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, …☆24Jun 11, 2025Updated 8 months ago
- Homebrew tap for Buf.☆14Feb 3, 2026Updated last week
- GUI for regripper☆11Mar 19, 2019Updated 6 years ago
- ☆12Updated this week
- Tailscale System(d) (bootable) container for use with Podman Machine, Podman Desktop, MicroShift and OpenShift Local installations☆12Dec 30, 2024Updated last year
- Go library with various time utilities used at Mailgun.☆10Jun 10, 2019Updated 6 years ago
- DEFER macros in C☆12Jul 14, 2024Updated last year
- listen and fire events globally through a static callbacks class☆21Mar 9, 2016Updated 9 years ago
- (Unofficial) Python API for https://sslbl.abuse.ch/☆11Dec 9, 2016Updated 9 years ago
- 🦉🔬A small PowerShell tool for finding information quickly on malicious IPs or FQDNs. Powershell threat hunting.☆11Jan 9, 2020Updated 6 years ago
- Technical cyber security resources across the NIST cyber security framework lifecycle☆11Apr 28, 2021Updated 4 years ago
- Tools for hunting security threats☆12Feb 4, 2020Updated 6 years ago
- Write and read JSON from different sources in one line☆10Apr 7, 2020Updated 5 years ago
- A simple go app that connects to a sqlite3 database☆11Sep 18, 2018Updated 7 years ago
- "A Practical Recipe for Hardware Implants" presentation materials.☆13Nov 10, 2020Updated 5 years ago
- A self-led workshop to demonstrate the power of go templates and how much fun you can have while using them with OpenShift!☆13Sep 1, 2020Updated 5 years ago
- ☆10May 6, 2023Updated 2 years ago
- Offline Active Directory Domain Services (AD DS) Join☆12Jan 4, 2017Updated 9 years ago
- ☆12Jan 17, 2026Updated 3 weeks ago
- A list of backdoor samples I find online.☆13Dec 16, 2019Updated 6 years ago