a2awais / Threat-HuntingView external linksLinks
Threat Hunting queries of multiple platforms
☆52Updated this week
Alternatives and similar repositories for Threat-Hunting
Users that are interested in Threat-Hunting are comparing it to the libraries listed below
Sorting:
- Run GEPA on your favorite non-python libraries.☆32Jan 22, 2026Updated 3 weeks ago
- Mass Hunting & Exploitation PoC for CVE-2025-55182 & CVE-2025-66478☆38Dec 7, 2025Updated 2 months ago
- A professional Red Team / Pentest tool for assessing the external perimeter of a company in a complete "black box" mode (zero knowledge, …☆29Nov 27, 2025Updated 2 months ago
- 🛡️ Detect and respond to security threats in real-time with God-Eye, an AI-driven tool designed for privacy and local deployment on mult…☆38Updated this week
- LibWinHttp is a simplified WinHTTP wrapper designed as a Crystal Palace shared library for implant development. Its primary purpose is to…☆41Nov 4, 2025Updated 3 months ago
- CyberFind — a next-generation OSINT reconnaissance tool designed for cybersecurity professionals, penetration testers, and digital invest…☆56Feb 8, 2026Updated last week
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆20Sep 11, 2023Updated 2 years ago
- Impacket with added MSSQL Relay server☆49Dec 30, 2025Updated last month
- Technical analysis of Starlink terminal telemetry showing GPS spoofing detection during Iran's January 2026 internet shutdown☆65Jan 14, 2026Updated last month
- ☆55Nov 18, 2025Updated 2 months ago
- RProxy LAB is intended solely for educational purposes and authorized security testing with EvilGinx / Modlishka / EvilPuppet e.t.c tools☆49Dec 14, 2025Updated 2 months ago
- ☆48Nov 26, 2025Updated 2 months ago
- A Rust-native DuckLake engine built on Apache DataFusion☆64Feb 4, 2026Updated last week
- Reverse engineer obfuscated JavaScript visually. Chain transforms, inspect AST changes, write reusable deobfuscation plugins.☆51Feb 4, 2026Updated last week
- WMI Explorer☆76Jan 5, 2026Updated last month
- Wonka is a sweet Windows tool that extracts Kerberos tickets from the Local Security Authority (LSA) cache. Like finding a ticket, but fo…☆164Oct 21, 2025Updated 3 months ago
- Dump LSASS via physical memory read primitives in vulnerable kernel drivers☆246Feb 2, 2026Updated 2 weeks ago
- ☆10Aug 4, 2020Updated 5 years ago
- Multi-step AI agents powered by Gemini 2.0 and the LangGraph framework. These agents orchestrate complex workflows and enhance their reas…☆10Dec 19, 2024Updated last year
- Ludus FastMCP enables AI-powered management of Ludus cyber ranges through natural language commands. The server exposes **157 tools** acr…☆69Dec 31, 2025Updated last month
- New 0 day vulnerability allowing to leak NTLM hashes from browsers with one click☆207Nov 18, 2025Updated 2 months ago
- A portable C# utility for enumerating local and remote windows sessions☆54Jan 1, 2026Updated last month
- ☆87May 29, 2025Updated 8 months ago
- QRSS Plus: live QRSS grabbers from around the world☆10Feb 9, 2026Updated last week
- A powerful, easy to use and intuitive way to create network analysis charts☆15Updated this week
- Benchmark evaluating ocean forecasting systems against reference datasets and observations.☆24Updated this week
- Remote service-staging tool built on Impacket, designed for BOF-style lateral movement workflows that lets you upload custom service load…☆119Dec 7, 2025Updated 2 months ago
- Purple-team telemetry & simulation toolkit.☆107Dec 16, 2025Updated 2 months ago
- ☆13Oct 21, 2024Updated last year
- Windows 11 kernel research framework demonstrating DSE bypass on Windows 11 25H2 through boot-time execution. Loads unsigned drivers by s…☆79Dec 22, 2025Updated last month
- A simple Python script to do quick, targeted recon of a given domain.☆68Apr 17, 2025Updated 9 months ago
- 🔍 Bug Bounty Search Engine - Advanced reconnaissance toolkit with 64+ Google dork queries organized into 10 categories for security rese…☆40Oct 6, 2025Updated 4 months ago
- Fast, free, easy, and object-agnostic video anonymization☆11Dec 12, 2020Updated 5 years ago
- Auction Theory Toolbox – Computer Verified Auctions☆14Jul 12, 2016Updated 9 years ago
- A Powerful XSS,RXSS,BXSS finding tool☆30Oct 29, 2025Updated 3 months ago
- ☆28Feb 3, 2026Updated last week
- Super good awesome☆10Jan 15, 2023Updated 3 years ago
- Intelligent memory system for OpenWebUI with semantic retrieval, LLM consolidation, and adaptive context injection