Hunt for Keywords , Mutex, Windows Event,Registry Keys,Process,Schedule tasks in Windows Machine
☆22Dec 8, 2024Updated last year
Alternatives and similar repositories for Windows-Threat-Hunting
Users that are interested in Windows-Threat-Hunting are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Simple shellcode injector.☆13Jan 6, 2019Updated 7 years ago
- Collection of scripts and tools related to the eCTHPv2 exam by INE.☆19Jun 12, 2022Updated 3 years ago
- A sub-domain reconnaissance written in golang☆12Jan 11, 2018Updated 8 years ago
- Multicore EVTX to Elasticsearch ingestor for incident responders.☆14May 12, 2021Updated 4 years ago
- ☆53Mar 4, 2019Updated 7 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Lazy SPL to detect Spring4Shell exploitation☆12Jul 8, 2022Updated 3 years ago
- All in one - Malware + Analysis by Cylance☆11Nov 23, 2018Updated 7 years ago
- Library of threat hunts to get any user started!☆50Sep 4, 2020Updated 5 years ago
- ☆58Mar 4, 2022Updated 4 years ago
- Threat Box Assessment Tool☆19Mar 5, 2026Updated last month
- This repo will contain slides and information from the Attacking Active Directory Hacking Series talks presented at SecKC.☆33Jun 26, 2024Updated last year
- AgentTesla botnet C&C RCE exploit.☆16Aug 13, 2019Updated 6 years ago
- ☆26Aug 20, 2025Updated 8 months ago
- Repository resource for threat hunter☆159Sep 14, 2018Updated 7 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- List of PowerShell commands and commandlets that should be in your Powershel watchlist☆39Jul 22, 2021Updated 4 years ago
- OWASP Foundation Web Respository☆20Mar 15, 2021Updated 5 years ago
- ☆14Aug 28, 2016Updated 9 years ago
- Zeek scripts that provide an alternative log file logging TLS/SSL traffic☆12May 4, 2021Updated 4 years ago
- evtx2json extracts events of interest from event logs, dedups them, and exports them to json.☆40May 3, 2021Updated 4 years ago
- Github Desktop RCE PoC☆28Dec 4, 2018Updated 7 years ago
- A collection of handy and specific tools for the Red Teamer☆11Aug 13, 2024Updated last year
- Winterfell hunt is a python script to perform auto threat hunting for malicious activities in windows OS based on collected data by winte…☆15Jul 23, 2020Updated 5 years ago
- This is just my personal compilation of APT malware from whitepaper releases, documents and malware samples from my personal research.☆32Jan 28, 2020Updated 6 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- A reasonably performant TF-IDF implementation.☆12Nov 20, 2022Updated 3 years ago
- Threat Hunt Investigation Methodology and Procedure☆15Jul 11, 2022Updated 3 years ago
- Cookiecutter template for new Ansible projects☆12Jul 14, 2017Updated 8 years ago
- Bash one-liner that will parse harmj0y's SharpRoast or Rebeus kerberoast into hashcat crack-able format.☆32Feb 28, 2019Updated 7 years ago
- This repository contains Splunk queries to hunt some anomalies☆47Jul 28, 2022Updated 3 years ago
- Various commands, tools, techniques that you can use to examine live Windows systems for signs of Compromise or for Threat Hunting.Can al…☆15Aug 15, 2022Updated 3 years ago
- No one writes dumb malware anymore. This is a repo for dumb malware.☆10Apr 18, 2017Updated 9 years ago
- A simple script that automates basic pentester reconaissance starting from nmap scans.☆10Dec 10, 2016Updated 9 years ago
- Playing around with token manipulation in C#.☆29Nov 6, 2019Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Detecting ATT&CK techniques & tactics for Linux☆257Oct 1, 2020Updated 5 years ago
- My CTF tasks and writeup☆38Dec 6, 2022Updated 3 years ago
- Simple decrypter for strings used in SamSam Ransomware samples.☆18Feb 21, 2020Updated 6 years ago
- A library and command line tool for extracting indicators of compromise (IOCs) from security reports in PDF, HTML, Word, or text format☆52Mar 20, 2026Updated last month
- A cheap and easy to build digital Theremin☆10Jan 29, 2026Updated 2 months ago
- ☆27Feb 26, 2016Updated 10 years ago
- ☆12Feb 16, 2017Updated 9 years ago