Collection of walkthroughs on various threat hunting techniques
☆77Aug 3, 2020Updated 5 years ago
Alternatives and similar repositories for threat-hunting-labs
Users that are interested in threat-hunting-labs are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Passive service locator, a python sniffer that identifies servers, clients, names and much more☆262Feb 9, 2026Updated 2 months ago
- Reference sheet for Threat Hunting Professional Course☆26Mar 10, 2019Updated 7 years ago
- Learn about a network from a pcap file or reading from an interface☆29Apr 6, 2024Updated 2 years ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,513Jan 12, 2026Updated 3 months ago
- Beacon Kibana Executable Report. Aggregates Sysmon Network Events With Elasticsearch and Kibana☆302Mar 19, 2026Updated last month
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- An Installation Script for Bro IDS on Debian Based Systems☆20Jun 25, 2020Updated 5 years ago
- Tools for simulating threats☆203Oct 27, 2023Updated 2 years ago
- ThreatHunt is a PowerShell repository that allows you to train your threat hunting skills.☆135Jul 25, 2019Updated 6 years ago
- Threat Hunting with ELK Workshop (InfoSecWorld 2017)☆65Oct 31, 2017Updated 8 years ago
- Slides and Other Resources from my latest Talks and Presentations☆24Sep 17, 2025Updated 7 months ago
- Information about the open-source-dfir slack community☆30Jun 17, 2023Updated 2 years ago
- ☆58Mar 4, 2022Updated 4 years ago
- Simple script to generate commands to achieve reverse shells.☆12Aug 12, 2019Updated 6 years ago
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆80Mar 19, 2026Updated 3 weeks ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Zeek Log Cheatsheets☆304Aug 12, 2025Updated 8 months ago
- This repo is where I store my Threat Hunting ideas/content☆89Mar 20, 2026Updated 3 weeks ago
- A CALDERA plugin for autonomous incident response☆27Mar 18, 2026Updated last month
- ☆30Nov 15, 2018Updated 7 years ago
- Information about most important hunts which can be performed by Threat hunters while searching for any adversary/threats inside the orga…☆15May 18, 2019Updated 6 years ago
- ☆14Aug 16, 2021Updated 4 years ago
- ☆12Jan 5, 2021Updated 5 years ago
- ATT&CK Remote Threat Hunting Incident Response☆206Dec 8, 2024Updated last year
- THOR Thunderstorm Collectors☆26Apr 8, 2026Updated last week
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Creating an ATT&CK Navigator layer with the detection coverage of the signals available within Tanium Threat Response.☆12Jun 2, 2021Updated 4 years ago
- ☆11May 30, 2021Updated 4 years ago
- Powershell - web traffic whitenoise generator☆47Jun 4, 2020Updated 5 years ago
- ☆2,397Oct 14, 2023Updated 2 years ago
- ☆77Jun 25, 2019Updated 6 years ago
- Device profile: Define acceptable amounts of traffic for your devices and see a report of outliers.☆16Jan 28, 2020Updated 6 years ago
- Corelight-Ansible-Roles are a collection of Ansible Roles and playbooks that install, configure, run and manage a variety of Corelight, S…☆16Jun 15, 2021Updated 4 years ago
- Volatility plugin to search for all Autostart Extensibility Points (AESPs)☆10May 16, 2024Updated last year
- Zeek package for tracking long connections to report them before they have completed.☆31Nov 25, 2025Updated 4 months ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A central place for me to share interesting PSRemoting configurations☆16Jun 28, 2017Updated 8 years ago
- Tools, techniques, cheat sheets, and other resources to assist those defending organizations and detecting adversaries☆460Feb 4, 2022Updated 4 years ago
- All my slides for any talks☆23Oct 13, 2024Updated last year
- ☆39Dec 10, 2020Updated 5 years ago
- Threat Hunt Investigation Methodology and Procedure☆15Jul 11, 2022Updated 3 years ago
- Various commands, tools, techniques that you can use to examine live Windows systems for signs of Compromise or for Threat Hunting.Can al…☆15Aug 15, 2022Updated 3 years ago
- This was code for analyzing round 1 of the MITRE Enterprise ATT&CK Evaluation. Please check out https://github.com/joshzelonis/Enterprise…☆94Apr 22, 2020Updated 5 years ago