archanchoudhury / Threat-HuntingView external linksLinks
This Repository gives the best and possible strategies against hunting the ransomware
☆26Aug 23, 2022Updated 3 years ago
Alternatives and similar repositories for Threat-Hunting
Users that are interested in Threat-Hunting are comparing it to the libraries listed below
Sorting:
- This Repository consists all Public Cheatsheets created by BlackPerl DFIR Content Team☆20Oct 9, 2024Updated last year
- It's a handy tool to help you analyze malware. You can use this tool to query your malware samples using different hashes or find all oth…☆20Jul 22, 2025Updated 6 months ago
- ☆12Feb 9, 2025Updated last year
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- Power-Forensics is the Best Friend for Incident Responders to perform IR and collect evidences for Linux based host☆12Jun 2, 2023Updated 2 years ago
- ☆54Updated this week
- This is the One Stop place where you can find almost all of your Tools of Requirements in DFIR☆85Mar 3, 2022Updated 3 years ago
- ☆12Jul 15, 2022Updated 3 years ago
- ☆13Sep 26, 2020Updated 5 years ago
- Threat Hunt Investigation Methodology and Procedure☆15Jul 11, 2022Updated 3 years ago
- Ingesting Shodan Monitor Alerts to Microsoft Sentinel☆34Sep 19, 2023Updated 2 years ago
- This is the published source code from the Worm Locker2.0 ransomware. Please open the README file in a zip file for more information.☆14Dec 18, 2020Updated 5 years ago
- Registry timestamp manipulation☆17Feb 26, 2014Updated 11 years ago
- Jupyter Notebooks for the Blue Team☆39Jan 16, 2025Updated last year
- Repo to hold my PowerShell Scripts☆17Oct 19, 2022Updated 3 years ago
- Reversed source code to the Babuk ransomware builder.☆17Jul 1, 2021Updated 4 years ago
- “Intelliroot Code Injection Hunter” is a tool that can to help you identify injected malicious code. The tool can identify and extract po…☆16Sep 21, 2022Updated 3 years ago
- Contains Actual Events and Codes of Threat Groups, APTs, Research Groups☆19Sep 10, 2022Updated 3 years ago
- Community Detection Signature Build and Distribution Pipeline for YARA, Suricata, Snort and Sigma☆27Jun 20, 2023Updated 2 years ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆55Dec 5, 2024Updated last year
- Active DIrectory Lab for Pentesting Practice☆24Aug 9, 2022Updated 3 years ago
- Conti Ransomware Source Code☆19Mar 1, 2022Updated 3 years ago
- A repository dedicated to tracking ransomware families based on leaked builders.☆22Apr 17, 2024Updated last year
- Automatically update IoC for lucky visitor scam☆26Apr 9, 2025Updated 10 months ago
- Reversed source code of the Babuk Ransomware Version 1☆20May 3, 2021Updated 4 years ago
- ☆68Jun 20, 2023Updated 2 years ago
- Repository with some necessary information for you to create your PenTest consultancy☆101Jan 12, 2025Updated last year
- ☆26Jun 22, 2022Updated 3 years ago
- A full analysis report detailing as much as possible of a Malware or a Threat☆31Jan 30, 2026Updated 2 weeks ago
- ☆34Jun 13, 2023Updated 2 years ago
- Jupyter Univere is a search engine for all infosec jupyter notebooks☆35Mar 24, 2025Updated 10 months ago
- This script enhances endpoint logging telemetry for the purpose of advanced malware threat detection or for building detections or malwar…☆40Apr 7, 2025Updated 10 months ago
- A powerful hardware ID spoofing tool designed to modify system identifiers for privacy and security purposes. Change MAC addresses, HWID,…☆17Nov 26, 2025Updated 2 months ago
- Collection of Tools & Techniques for analyzing URLs☆33Oct 1, 2023Updated 2 years ago
- ☆11Feb 28, 2022Updated 3 years ago
- Manage Azure and Microsoft 365 with the Microsoft Graph PowerShell SDK!☆79Aug 29, 2024Updated last year
- This is the One Stop place where you can several Detection Rules which can help you to kick start your journey on SIEM, SOC work.☆41Jun 27, 2021Updated 4 years ago
- $h!tty Skidded malwares I found online (warning - very cringe) Disclaimer: Most of them still dangerous. This repo is for educational pur…☆30Oct 12, 2023Updated 2 years ago
- ☆35Sep 25, 2020Updated 5 years ago