Collection of walkthroughs on various threat hunting techniques
☆76Aug 3, 2020Updated 5 years ago
Alternatives and similar repositories for threat-hunting-labs
Users that are interested in threat-hunting-labs are comparing it to the libraries listed below
Sorting:
- Passive service locator, a python sniffer that identifies servers, clients, names and much more☆259Feb 9, 2026Updated last month
- An Installation Script for Bro IDS on Debian Based Systems☆20Jun 25, 2020Updated 5 years ago
- Learn about a network from a pcap file or reading from an interface☆29Apr 6, 2024Updated last year
- Beacon Kibana Executable Report. Aggregates Sysmon Network Events With Elasticsearch and Kibana☆299Feb 9, 2026Updated last month
- Simple script to generate commands to achieve reverse shells.☆12Aug 12, 2019Updated 6 years ago
- A curated list of tools for incident response☆21Sep 24, 2019Updated 6 years ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,515Jan 12, 2026Updated last month
- Tools for simulating threats☆202Oct 27, 2023Updated 2 years ago
- ☆58Mar 4, 2022Updated 4 years ago
- ATT&CK Remote Threat Hunting Incident Response☆206Dec 8, 2024Updated last year
- Information about most important hunts which can be performed by Threat hunters while searching for any adversary/threats inside the orga…☆15May 18, 2019Updated 6 years ago
- Device profile: Define acceptable amounts of traffic for your devices and see a report of outliers.☆16Jan 28, 2020Updated 6 years ago
- Zeek Log Cheatsheets☆303Aug 12, 2025Updated 6 months ago
- Information about the open-source-dfir slack community☆30Jun 17, 2023Updated 2 years ago
- Template for building a packet sniffer☆15Mar 25, 2024Updated last year
- Corelight-Ansible-Roles are a collection of Ansible Roles and playbooks that install, configure, run and manage a variety of Corelight, S…☆16Jun 15, 2021Updated 4 years ago
- ☆30Nov 15, 2018Updated 7 years ago
- ThreatHunt is a PowerShell repository that allows you to train your threat hunting skills.☆135Jul 25, 2019Updated 6 years ago
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆19Mar 26, 2019Updated 6 years ago
- Some important DFIR Resources☆84Mar 16, 2023Updated 2 years ago
- ☆77Jun 25, 2019Updated 6 years ago
- Just a collection of pentest stuffs☆94Feb 8, 2020Updated 6 years ago
- Utility for parsing Bro log files into CSV or JSON format☆41Jan 12, 2023Updated 3 years ago
- This is a Burpsuite plugin built to enable you to import your directory bruteforcing results into burp for easy viewing later. This is an…☆36Mar 1, 2023Updated 3 years ago
- ☆2,392Oct 14, 2023Updated 2 years ago
- ☆11May 30, 2021Updated 4 years ago
- ☆39Dec 10, 2020Updated 5 years ago
- Workflows for Shuffle☆24Oct 26, 2022Updated 3 years ago
- DetectionLabELK is a fork from DetectionLab with ELK stack instead of Splunk.☆573Dec 12, 2021Updated 4 years ago
- A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the…☆62Nov 26, 2025Updated 3 months ago
- Zeek network security monitor plugin that enables parsing of the Tabular Data Stream (TDS) protocol☆25May 30, 2024Updated last year
- THOR Thunderstorm Collectors☆25Feb 26, 2026Updated last week
- Collection of Dashboards for Threat Hunting and more!☆74Oct 17, 2020Updated 5 years ago
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆79Feb 9, 2026Updated last month
- Security R package with a set of utils to analyse the different industry standards (MITRE and NIST).☆12May 27, 2019Updated 6 years ago
- a port made of honey for blocking people☆13Jun 24, 2020Updated 5 years ago
- Python script to run battery of Volatility plugins against a forensic memory image☆10Jun 22, 2019Updated 6 years ago
- A curated list of CTF frameworks, libraries, resources and softwares☆10Nov 11, 2015Updated 10 years ago
- PowerShell scripts to aid investigators when utilizing O365 and Magnet Axiom.☆12Aug 26, 2024Updated last year