cyb3rmik3 / Hunting-Lists
A repository of curated lists with elements such as IoCs to use for threat hunting & detection queries.
☆34Updated 7 months ago
Alternatives and similar repositories for Hunting-Lists:
Users that are interested in Hunting-Lists are comparing it to the libraries listed below
- MS Graph Commands and Tools for Blue Teamers☆49Updated last year
- A simple tool designed to create Atomic Red Team tests with ease.☆37Updated this week
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆51Updated last year
- Living off the False Positive!☆34Updated last month
- Baseline a Windows System against LOLBAS☆25Updated 10 months ago
- Advanced Email Threat Hunting w/ Detection as Code☆51Updated last month
- Domain Response is a tool that is designed to help you automate the investigation for a domain. This tool is specificly designed to autom…☆47Updated 11 months ago
- ☆32Updated 11 months ago
- Sigma detection rules for hunting with the threathunting-keywords project☆55Updated last week
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆35Updated last month
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆29Updated 10 months ago
- ASR Configurator, Essentials and Atomic Testing☆37Updated 4 months ago
- Table of AD and Azure assets and whether they belong to Tier Zero☆26Updated last year
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆81Updated 10 months ago
- DEFCON 31 slide deck and video link☆58Updated 8 months ago
- Slides of my public talks☆54Updated last year
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆51Updated 3 months ago
- ☆24Updated 2 years ago
- CIS Benchmark testing of Windows SIEM configuration☆44Updated last year
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆71Updated last month
- Data breaches, Leaks, Malwares Forums List <Please Use Vpn/TOR don't click on Link directly bad OPSEC>☆48Updated last week
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆32Updated 3 months ago
- This project aims to bridge the gap between Microsoft Attack Surface Reduction (ASR) rules and MITRE ATT&CK by mapping ASR rules to their…☆24Updated 3 months ago
- ☆32Updated last year
- Placeholder for my detection repo and misc detection engineering content☆43Updated last year
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆60Updated 7 months ago
- ☆30Updated this week
- create a "simulated internet" cyber range environment☆15Updated last month
- Tools and scripts to deploy and manage OpenRelik instances☆13Updated 2 weeks ago