TracecatHQ / huntsLinks
π»ββοΈ πΉ Threat hunting with Polars and flaws.cloud AWS CloudTrail datasets.
β14Updated last year
Alternatives and similar repositories for hunts
Users that are interested in hunts are comparing it to the libraries listed below
Sorting:
- β12Updated this week
- Open-source Fabric templates for cybersecurity and complianceβ27Updated 10 months ago
- Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. The researchβ¦β51Updated 6 months ago
- Short deep dive into Threat Hunting on AWSβ14Updated 2 years ago
- Intelligence around common attacker behaviors (MITRE ATT&CK TTPs), in the form of ATT&CK Navigator "layer" json files.β35Updated 3 years ago
- VelociraptorMCP is a Model Context Protocol bridge for exposing LLMs to MCP clients.β62Updated 3 months ago
- Turn any blog into structured threat intelligence.β40Updated this week
- β52Updated 2 months ago
- Workflows for Shuffleβ24Updated 3 years ago
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry Nβ¦β40Updated 7 months ago
- Automatic detection engineering technical state complianceβ55Updated last year
- Convert Sigma rules to SIEM queries, directly in your browser.β95Updated last month
- Rules shared by the community from 100 Days of YARA 2025β37Updated 10 months ago
- simple webapp for converting sigma rules into siem queries using the pySigma libraryβ51Updated 2 years ago
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.β59Updated 3 years ago
- This repository includes a mapping table and a reference process that allows converting between STIX 2.1 Course of Action objects that maβ¦β16Updated 3 years ago
- Repository that contains a set of purposefully erroneous Yara rules.β61Updated 4 months ago
- Track progress and keep notes while working through likethecoins' CTI Self Study Planβ29Updated 3 years ago
- Extracts IoCs, TTPs and the relationships between them. Outputs a STIX 2.1 bundle.β77Updated last week
- β100Updated last month
- pocket guide for core detection engineering conceptsβ30Updated 2 years ago
- Library of threat hunts to get any user started!β46Updated 5 years ago
- Anvilogic Forgeβ112Updated 2 months ago
- A pySigma wrapper and langchain toolkit for automatic rule creation/translationβ88Updated last month
- Repo for experimenting and testing MCP server builds for CTI-related research.β27Updated 6 months ago
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.β52Updated last year
- Intel Retrieval Augmented Generation (RAG) Utilitiesβ91Updated last year
- This repository contains the research and components of our research into using Sigma for AWS Incident Response.β31Updated 2 years ago
- A collection of tips for using MISP.β75Updated 11 months ago
- Adversarial Interception Mission Oriented Discovery and Disruption Framework, or AIMOD2, is a structured threat hunting approach to proacβ¦β89Updated 2 years ago