A threat hunting / data analysis environment based on Python, Pandas, PySpark and Jupyter Notebook.
☆251Jul 19, 2021Updated 4 years ago
Alternatives and similar repositories for hunter
Users that are interested in hunter are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An informational repo about hunting for adversaries in your IT environment.☆1,863Nov 17, 2021Updated 4 years ago
- Automated, Collection, and Enrichment Platform☆326Nov 14, 2019Updated 6 years ago
- Clearcut is a tool that uses machine learning to help you focus on the log entries that really need manual review☆196Oct 24, 2016Updated 9 years ago
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,541Jan 12, 2026Updated 3 months ago
- Sources, configuration and how to detect evil things utilizing Microsoft Sysmon.☆940Dec 12, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Queries to parse sysmon event log file with microsoft logparser☆58Mar 31, 2015Updated 11 years ago
- A Python library to help with some common threat hunting data analysis operations☆142Apr 23, 2023Updated 3 years ago
- Open Source Security Events Metadata (OSSEM)☆1,293Feb 27, 2023Updated 3 years ago
- A collection of resources for Threat Hunters☆917Oct 15, 2024Updated last year
- DPS' Lightweight Investigation Notebook☆433Dec 31, 2023Updated 2 years ago
- Lists of sources and utilities utilized to hunt, detect and prevent evildoers.☆169Dec 10, 2018Updated 7 years ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,510Jan 12, 2026Updated 3 months ago
- ☆350Mar 19, 2021Updated 5 years ago
- "Evolving AppCompat/AmCache data analysis beyond grep"☆209Sep 15, 2021Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- An open source framework for enterprise level automated analysis.☆393Jun 27, 2022Updated 3 years ago
- Yara-Endpoint is a tool useful for incident response as well as anti-malware enpoint base on Yara signatures.☆109Mar 13, 2018Updated 8 years ago
- Indicator Extractor☆141Jul 14, 2018Updated 7 years ago
- Re-play Security Events☆1,743Mar 20, 2024Updated 2 years ago
- Configuration files for the SOF-ELK VM☆1,733Jan 21, 2026Updated 3 months ago
- Collect, Process, and Hunt with host based data from MacOS, Windows, and Linux☆506Oct 21, 2022Updated 3 years ago
- Powershell Threat Hunting Module☆291Sep 21, 2016Updated 9 years ago
- This is a repository from Adam Swan and I's presentation on Windows Logs Zero 2 Hero.☆22Jan 30, 2018Updated 8 years ago
- Tool to extract indicators of compromise from security reports in PDF format☆439Feb 24, 2023Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Zeek Analysis Tools (ZAT): Processing and analysis of Zeek network data with Pandas, scikit-learn, Kafka and Spark☆455Mar 19, 2026Updated last month
- Splunk code (SPL) for serious threat hunters and detection engineers.☆293Jan 15, 2024Updated 2 years ago
- An information security preparedness tool to do adversarial simulation.☆1,138Apr 1, 2019Updated 7 years ago
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,317Jan 22, 2025Updated last year
- A Splunk app with saved reports derived from Sigma rules☆73Apr 24, 2018Updated 8 years ago
- Connect your mail client/infrastructure to MISP in order to create events based on the information contained within mails.☆70Nov 11, 2023Updated 2 years ago
- Threat hunting repo for my independent study on threat hunting with OSQuery☆27Jan 16, 2018Updated 8 years ago
- A repository for using windows event forwarding for incident detection and response☆1,320Sep 8, 2025Updated 7 months ago
- ☆13Feb 6, 2018Updated 8 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Collecting & Hunting for IOCs with gusto and style☆117Aug 9, 2018Updated 7 years ago
- An analytical framework for network traffic and behavioral analytics☆457Dec 7, 2022Updated 3 years ago
- ☆1,092May 1, 2019Updated 7 years ago
- CimSweep is a suite of CIM/WMI-based tools that enable the ability to perform incident response and hunting operations remotely across al…☆659Aug 19, 2019Updated 6 years ago
- Assimilate is a series of scripts for using the Naïve Bayes algorithm to find potential malicious activity in HTTP headers☆93Oct 15, 2017Updated 8 years ago
- Cyber Analytics Repository☆1,001May 16, 2025Updated 11 months ago
- A framework for developing alerting and detection strategies for incident response.☆870Sep 8, 2025Updated 7 months ago