An AI-backed threat hunting assistant that aligns to the PEAK framework.
☆37Jan 30, 2026Updated last month
Alternatives and similar repositories for PEAK-Assistant
Users that are interested in PEAK-Assistant are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Archive of publicly available threat INTel reports (mostly APT Reports but not limited to).☆11Sep 30, 2018Updated 7 years ago
- An Inspect extension for agentic cyber evaluations☆24Feb 24, 2026Updated last month
- Method of finding interesting domains using keywords + JARMs☆13Jan 30, 2023Updated 3 years ago
- ☆30Jan 13, 2026Updated 2 months ago
- A catalog of services that can be publicly exposed within different cloud providers.☆14Aug 30, 2024Updated last year
- A Python, Boto3 script that leverages a forensic volume to attach & mount to a selected instance, run a memory dump, unmount and detach f…☆12Jul 15, 2020Updated 5 years ago
- A collection of ARM-based detections for Azure/AzureAD based TTPs☆90Dec 12, 2023Updated 2 years ago
- Disk Image Mounting Script☆11Jan 22, 2026Updated 2 months ago
- Font Awesome for Django☆12Dec 27, 2021Updated 4 years ago
- Read Windows message table entries.☆11Feb 5, 2023Updated 3 years ago
- A Web Application Penetration Testing Framework build in React with an Node/Express/MongoDB back-end☆25Mar 7, 2023Updated 3 years ago
- ☆10Sep 12, 2024Updated last year
- Tool to decrypt encrypted strings in AgentTesla☆16Jan 24, 2022Updated 4 years ago
- Fast Windows post-exploitation wins after initial access.☆29Jan 28, 2026Updated last month
- Tool to rip system and user data from OSX and macOS☆16Dec 6, 2022Updated 3 years ago
- Scrapy middleware module which uses image parsing to submit a captcha response to amazon.☆12Mar 27, 2019Updated 6 years ago
- Volumetric Development☆11Mar 19, 2024Updated 2 years ago
- Documentation for connecting Microsoft Sentinel and the ACSC CTIS platform☆10Jan 23, 2024Updated 2 years ago
- ☆169Sep 30, 2025Updated 5 months ago
- Set of utilities for getting information about Windows Events☆15Jun 5, 2018Updated 7 years ago
- Parsers for .mdf file of Microsoft SQL Server (MSSQL)☆15Mar 28, 2020Updated 5 years ago
- A simple way of detecting multithreaded exfiltration in Zeek.☆15May 1, 2025Updated 10 months ago
- An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and secur…☆174Mar 11, 2026Updated 2 weeks ago
- Code for Jarvis Series on YouTube - Techmoto☆37Jan 17, 2025Updated last year
- TIM is a Kusto investigation platform that enables a user to quickly pivot between data sources; annotate their findings; and promotes co…☆23Aug 7, 2024Updated last year
- ☆12Feb 15, 2024Updated 2 years ago
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 8 years ago
- This is a rofi theme based on the Materia GTK Theme☆12Jan 8, 2020Updated 6 years ago
- ☆11Oct 3, 2019Updated 6 years ago
- macOS Artifact Intelligence Tool☆13Apr 30, 2019Updated 6 years ago
- Split stream based on previous execution: new items, updated items, old items☆14Mar 5, 2022Updated 4 years ago
- Claude Code plugin providing skills for x64dbg debugger automation☆90Mar 13, 2026Updated last week
- ☆24Apr 22, 2025Updated 11 months ago
- A curated list of AI driven Cyber security Resources☆48Updated this week
- ☆15Feb 12, 2023Updated 3 years ago
- A small tool to easily mount APFS image on macOS for forensics.☆16Jul 30, 2020Updated 5 years ago
- A script to create and assign SOP tasks into the cases☆20Aug 16, 2020Updated 5 years ago
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆60Mar 12, 2022Updated 4 years ago
- Tool to backup grist documents☆13Aug 5, 2023Updated 2 years ago