Threat Hunting queries of multiple platforms
☆64Feb 26, 2026Updated last month
Alternatives and similar repositories for Threat-Hunting
Users that are interested in Threat-Hunting are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Script to check Azure Front Door WAF for insecure RemoteAddr variable☆28Jul 11, 2025Updated 8 months ago
- ☆51Nov 26, 2025Updated 4 months ago
- ☆59Dec 10, 2025Updated 3 months ago
- Open Source Implementation of Cobalt Strike's Malleable C2☆96Jan 27, 2026Updated 2 months ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆20Sep 11, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Mass Hunting & Exploitation PoC for CVE-2025-55182 & CVE-2025-66478☆38Dec 7, 2025Updated 3 months ago
- Noob Penetration tester☆11Jul 17, 2025Updated 8 months ago
- Block abused TLDs in Tenant Allow BlockList☆14Jan 21, 2026Updated 2 months ago
- Threat Modeling with ATT&CK defines how to integreate MITRE ATT&CK® into your organization’s existing threat modeling methodology.☆12May 28, 2025Updated 10 months ago
- A formula to calculate bounty amounts.☆15Dec 2, 2017Updated 8 years ago
- A professional Red Team / Pentest tool for assessing the external perimeter of a company in a complete "black box" mode (zero knowledge, …☆29Feb 15, 2026Updated last month
- Run GEPA on your favorite non-python libraries.☆34Jan 22, 2026Updated 2 months ago
- Impacket☆50Feb 25, 2026Updated last month
- ☆18Oct 15, 2024Updated last year
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Scripts for importing threat feeds and CTI articles, blogs, and reports into MISP.☆18Jun 16, 2025Updated 9 months ago
- List of OSINT Capture The Flag platforms☆42Updated this week
- Offensive Assembly code snippets.☆13Jul 12, 2023Updated 2 years ago
- MDE/MDI Defender setup for Ludus☆55Mar 14, 2026Updated 2 weeks ago
- Smilex-Eye is a high-speed, advanced OSINT suite that bridges the gap between raw global internet data and actionable security intelligen…☆35Jan 4, 2026Updated 2 months ago
- LibWinHttp is a simplified WinHTTP wrapper designed as a Crystal Palace shared library for implant development. Its primary purpose is to…☆41Nov 4, 2025Updated 4 months ago
- ☆57Nov 18, 2025Updated 4 months ago
- SecTor - Not-So-Secret Agents: Deploying AI to Optimize Security Operations☆32Oct 15, 2025Updated 5 months ago
- Script to check for CVE-2023-36884 hardening☆15Jul 18, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A scanner for the FortiNet vulnerability CVE-2025-64446☆30Nov 18, 2025Updated 4 months ago
- Cobalt Strike UDC2 implementation that provides an Slack C2 channel☆66Jan 5, 2026Updated 2 months ago
- MAPS cloud scanner and response parser for Microsoft Defender research.☆87Feb 19, 2026Updated last month
- ☆39Updated this week
- SAPLAR - LFI & Path Traversal Scanner☆15Mar 11, 2025Updated last year
- DevOps for Hackers with Hands-On Labs w/ Ralph May (4-Hour Workshop)☆18Aug 2, 2021Updated 4 years ago
- ☆13Mar 6, 2025Updated last year
- CVE-2025-55182-bypass-waf☆31Jan 8, 2026Updated 2 months ago
- Hunting Queries for Microsoft Defender Security Center https://docs.microsoft.com/en-us/windows/security/threat-protection/microsoft-defe…☆40Apr 8, 2021Updated 4 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- AI-Powered Threat Intelligence MCP tool☆33Jul 18, 2025Updated 8 months ago
- Prevent in-process process termination by patching exit APIs☆65Nov 9, 2025Updated 4 months ago
- A Qemu Proxmox Template builder project using Packer☆73Dec 5, 2025Updated 3 months ago
- Wonka is a sweet Windows tool that extracts Kerberos tickets from the Local Security Authority (LSA) cache. Like finding a ticket, but fo…☆167Oct 21, 2025Updated 5 months ago
- Android Jiagu unpacker - Automated DEX extraction and restoration from obfuscated APKs☆31Oct 29, 2025Updated 5 months ago
- Context-aware Nmap reconnaissance framework with traffic intelligence and AD awareness☆26Feb 4, 2026Updated last month
- Some Hashcat Rules for 2020 and beyond. Contributions encouraged!☆26May 26, 2022Updated 3 years ago