activecm / threat-hunting-labsView external linksLinks
Collection of walkthroughs on various threat hunting techniques
☆76Aug 3, 2020Updated 5 years ago
Alternatives and similar repositories for threat-hunting-labs
Users that are interested in threat-hunting-labs are comparing it to the libraries listed below
Sorting:
- Passive service locator, a python sniffer that identifies servers, clients, names and much more☆258Feb 9, 2026Updated last week
- An Installation Script for Bro IDS on Debian Based Systems☆20Jun 25, 2020Updated 5 years ago
- Reference sheet for Threat Hunting Professional Course☆26Mar 10, 2019Updated 6 years ago
- Learn about a network from a pcap file or reading from an interface☆29Apr 6, 2024Updated last year
- Beacon Kibana Executable Report. Aggregates Sysmon Network Events With Elasticsearch and Kibana☆298Feb 9, 2026Updated last week
- Simple script to generate commands to achieve reverse shells.☆12Aug 12, 2019Updated 6 years ago
- A curated list of tools for incident response☆20Sep 24, 2019Updated 6 years ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,514Jan 12, 2026Updated last month
- ☆58Mar 4, 2022Updated 3 years ago
- Information about most important hunts which can be performed by Threat hunters while searching for any adversary/threats inside the orga…☆15May 18, 2019Updated 6 years ago
- Device profile: Define acceptable amounts of traffic for your devices and see a report of outliers.☆16Jan 28, 2020Updated 6 years ago
- Zeek Log Cheatsheets☆302Aug 12, 2025Updated 6 months ago
- Information about the open-source-dfir slack community☆30Jun 17, 2023Updated 2 years ago
- Corelight-Ansible-Roles are a collection of Ansible Roles and playbooks that install, configure, run and manage a variety of Corelight, S…☆16Jun 15, 2021Updated 4 years ago
- Template for building a packet sniffer☆15Mar 25, 2024Updated last year
- ☆30Nov 15, 2018Updated 7 years ago
- Threat Hunting with ELK Workshop (InfoSecWorld 2017)☆65Oct 31, 2017Updated 8 years ago
- ThreatHunt is a PowerShell repository that allows you to train your threat hunting skills.☆135Jul 25, 2019Updated 6 years ago
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆19Mar 26, 2019Updated 6 years ago
- Some important DFIR Resources☆84Mar 16, 2023Updated 2 years ago
- ☆77Jun 25, 2019Updated 6 years ago
- Just a collection of pentest stuffs☆94Feb 8, 2020Updated 6 years ago
- This is a Burpsuite plugin built to enable you to import your directory bruteforcing results into burp for easy viewing later. This is an…☆36Mar 1, 2023Updated 2 years ago
- Utility for parsing Bro log files into CSV or JSON format☆41Jan 12, 2023Updated 3 years ago
- ☆2,383Oct 14, 2023Updated 2 years ago
- ☆11May 30, 2021Updated 4 years ago
- ☆39Dec 10, 2020Updated 5 years ago
- Workflows for Shuffle☆24Oct 26, 2022Updated 3 years ago
- DetectionLabELK is a fork from DetectionLab with ELK stack instead of Splunk.☆573Dec 12, 2021Updated 4 years ago
- A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the…☆62Nov 26, 2025Updated 2 months ago
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆79Feb 9, 2026Updated last week
- THOR Thunderstorm Collectors☆25Updated this week
- Zeek network security monitor plugin that enables parsing of the Tabular Data Stream (TDS) protocol☆25May 30, 2024Updated last year
- Collection of Dashboards for Threat Hunting and more!☆73Oct 17, 2020Updated 5 years ago
- PowerShell scripts to aid investigators when utilizing O365 and Magnet Axiom.☆12Aug 26, 2024Updated last year
- Various Crypter Project☆10Feb 26, 2014Updated 11 years ago
- Detection rules and threat hunting queries in Defender XDR and Azure Sentinel☆16Updated this week
- a port made of honey for blocking people☆13Jun 24, 2020Updated 5 years ago
- Notes on Active Directory analysis and exploitation☆11Mar 7, 2019Updated 6 years ago