APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the sea of windows event logs to decrease the time to uncover suspicious activity
☆1,408Nov 7, 2024Updated last year
Alternatives and similar repositories for APT-Hunter
Users that are interested in APT-Hunter are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Windows Events Attack Samples☆2,554Jan 24, 2023Updated 3 years ago
- Rapidly Search and Hunt through Windows Forensic Artefacts☆3,534May 2, 2026Updated last week
- A standalone SIGMA-based detection tool for EVTX, Auditd and Sysmon for Linux logs☆806Apr 6, 2026Updated last month
- Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.☆3,145Updated this week
- Investigate malicious Windows logon by visualizing and analyzing Windows event log☆3,171Apr 22, 2026Updated 2 weeks ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Collection of Event ID ressources useful for Digital Forensics and Incident Response☆651Jun 19, 2024Updated last year
- WELA (Windows Event Log Analyzer): The Swiss Army knife for Windows Event Logs! ゑ羅(ウェラ)☆778Feb 3, 2023Updated 3 years ago
- A toolset to make a system look as if it was the victim of an APT attack☆2,739Sep 23, 2025Updated 7 months ago
- Scan files or process memory for CobaltStrike beacons and parse their configuration☆922Aug 19, 2021Updated 4 years ago
- Malwoverview is a first response tool for threat hunting across VirusTotal, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, M…☆3,820Apr 16, 2026Updated 3 weeks ago
- ☆1,134Dec 19, 2023Updated 2 years ago
- Defences against Cobalt Strike☆1,302Jul 14, 2022Updated 3 years ago
- ☆2,403Oct 14, 2023Updated 2 years ago
- Interesting APT Report Collection And Some Special IOCs☆2,979Updated this week
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows…☆2,111Dec 11, 2024Updated last year
- Utilities for Sysmon☆1,638Apr 4, 2026Updated last month
- Repository for threat hunting and detection queries, etc. for Defender for Endpoint and Microsoft Sentinel in KQL(Kusto Query Language).☆812Jan 14, 2026Updated 3 months ago
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,544Jan 12, 2026Updated 3 months ago
- Set of EVTX samples (>270) mapped to MITRE ATT&CK tactic and techniques to measure your SIEM coverage or developed new use cases.☆626Dec 8, 2025Updated 5 months ago
- Open Source EDR for Windows☆1,302Feb 25, 2023Updated 3 years ago
- Sysmon event simulation utility which can be used to simulate the attacks to generate the Sysmon Event logs for testing the EDR detection…☆869Jan 20, 2022Updated 4 years ago
- Incident Response Documentation made easy. Developed by Incident Responders for Incident Responders☆1,070Oct 5, 2023Updated 2 years ago
- Main Sigma Rule Repository☆10,386May 1, 2026Updated last week
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Documentation and scripts to properly enable Windows event logs.☆694Oct 3, 2025Updated 7 months ago
- A Cloud Forensics Powershell module to run threat hunting playbooks on data from Azure and O365☆789Oct 29, 2022Updated 3 years ago
- Detect Tactics, Techniques & Combat Threats☆2,286Apr 29, 2026Updated last week
- Threat Hunting tool about Sysmon and graphs☆339May 28, 2023Updated 2 years ago
- Small and highly portable detection tests based on MITRE's ATT&CK.☆11,888Updated this week
- Elastic Security detection content for Endpoint☆1,427Updated this week
- A repository of sysmon configuration modules☆3,031Aug 21, 2024Updated last year
- Digging Deeper....☆3,950Updated this week
- DFIRTrack - The Incident Response Tracking Application☆534Jan 13, 2026Updated 3 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A repository of DFIR-related Mind Maps geared towards the visual learners!☆551Sep 2, 2022Updated 3 years ago
- Loki - Simple IOC and YARA Scanner☆3,753Jan 12, 2026Updated 3 months ago
- Re-play Security Events☆1,746Mar 20, 2024Updated 2 years ago
- Hunts out CobaltStrike beacons and logs operator command output☆960Sep 4, 2024Updated last year
- Misc Threat Hunting Resources☆378Jan 26, 2023Updated 3 years ago
- Incident Response - Fast suspicious file finder☆256Jan 24, 2026Updated 3 months ago
- A curated list of tools for incident response☆9,009Jul 18, 2024Updated last year