akky2892 / Cyber-Threat-HuntingView external linksLinks
Information about most important hunts which can be performed by Threat hunters while searching for any adversary/threats inside the organisation.
☆15May 18, 2019Updated 6 years ago
Alternatives and similar repositories for Cyber-Threat-Hunting
Users that are interested in Cyber-Threat-Hunting are comparing it to the libraries listed below
Sorting:
- A simple many-rules to many-files YARA scanner for incident response or malware zoos.☆27Jun 3, 2018Updated 7 years ago
- Generate a Yara rule to find base64-encoded files containg a specific keyword☆40Jul 13, 2018Updated 7 years ago
- Writeups of some of PicoCTF 2017 challenges.☆10Aug 3, 2018Updated 7 years ago
- Microsoft Compound File Binary (CFB) file format Python IO☆15Aug 27, 2014Updated 11 years ago
- Work in Progress repo☆15Apr 18, 2019Updated 6 years ago
- PDF Parser is a command line tool and go library for analyzing PDF files.☆14Jan 25, 2024Updated 2 years ago
- ReviveIT (revit) is a proof of concept file recovery tool (carver)☆12Dec 3, 2020Updated 5 years ago
- ☆14May 30, 2018Updated 7 years ago
- ☆38Jan 3, 2022Updated 4 years ago
- Get USB Devices from Registry hives☆22Nov 15, 2021Updated 4 years ago
- The following repository contains the SecurityTube Linux Assembly Expert assignments, and exam☆18Nov 27, 2017Updated 8 years ago
- ☆21Apr 19, 2024Updated last year
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆42Sep 18, 2018Updated 7 years ago
- Primary data pipelines for intrusion detection, security analytics and threat hunting☆85Jan 9, 2022Updated 4 years ago
- SWF parser and AVM2 (Actionscript 3) bytecode parser☆19Mar 26, 2017Updated 8 years ago
- ☆16Jan 31, 2015Updated 11 years ago
- Epimitheus is a tool that uses graphical database Neo4j for Windows Events visualization.☆19Mar 13, 2022Updated 3 years ago
- Lightweight Microsoft OLE file parser in pure Python☆20Oct 17, 2019Updated 6 years ago
- Library to process OLE compound file format. This is a work in progress and was initially written for jumplist parsing (for which it does…☆19Feb 2, 2025Updated last year
- Silly proof-of-concept for a PDF chatroom☆21May 3, 2023Updated 2 years ago
- CLI tool to compute the TypeRefHash for .NET binaries.☆19Nov 10, 2021Updated 4 years ago
- XOR Key Extractor☆51Aug 10, 2024Updated last year
- Manage Your Large Team of Consultants☆11Sep 18, 2025Updated 4 months ago
- ☆19Nov 26, 2020Updated 5 years ago
- PowerShell Script to facilitate the processing of SRUM data for on-the-fly forensics and if needed threat hunting☆23Oct 26, 2019Updated 6 years ago
- xlrd2 is a variant of xlrd that is actively maintained☆23Aug 1, 2024Updated last year
- Training material for the Shellcode-Lab, including Slides and Codes☆19Jun 13, 2019Updated 6 years ago
- lnk_parser is a full rust implementation to parse windows LNK files☆22Jul 12, 2025Updated 7 months ago
- THOR Thunderstorm Collectors☆25Updated this week
- Pentesting resources☆23May 3, 2019Updated 6 years ago
- This repo is dedicated to all my tricks, tweaks and modules for testing and hunting threats. This repo contains multiple directories whic…☆57Jan 10, 2018Updated 8 years ago
- A script to assist in processing forensic RAM captures for malware triage☆26Feb 4, 2021Updated 5 years ago
- Python script to compress VBA macro files☆24Feb 2, 2023Updated 3 years ago
- Streaming Unexpected Network Byte Sequences with High Probability of Blue Screening or Otherwise Crashing Attacker Command-and-Control No…☆22Jul 14, 2019Updated 6 years ago
- Malware Analysis tools☆26Sep 14, 2024Updated last year
- AWS EKS Cluster Forensics☆23Aug 16, 2021Updated 4 years ago
- Useful commands for infosec☆28Feb 13, 2023Updated 3 years ago
- Python library to query various sources of threat intelligence for data on domains, file hashes, and IP addresses.☆31Nov 6, 2023Updated 2 years ago
- A website and framework for testing NIDS detection☆57Aug 29, 2021Updated 4 years ago