cyb3rmik3 / Hunting-Lists
A repository of curated lists with elements such as IoCs to use for threat hunting & detection queries.
☆31Updated last month
Related projects: ⓘ
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆48Updated last year
- MS Graph Commands and Tools for Blue Teamers☆47Updated 10 months ago
- Contains compiled binaries of Volatility☆28Updated 2 months ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated last year
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆49Updated 3 months ago
- Placeholder for my detection repo and misc detection engineering content☆43Updated 10 months ago
- Domain Response is a tool that is designed to help you automate the investigation for a domain. This tool is specificly designed to autom…☆40Updated 5 months ago
- Data breaches, Leaks, Malwares Forums List <Please Use Vpn/TOR don't click on Link directly bad OPSEC>☆40Updated this week
- The ultimate solution for remotely deploying Crowdstrike sensors quickly and discreetly on any other EDR platform.☆21Updated 3 weeks ago
- ASR Configurator, Essentials and Atomic Testing☆32Updated 3 weeks ago
- Sigma detection rules for hunting with the threathunting-keywords project☆47Updated 2 weeks ago
- create a "simulated internet" cyber range environment☆11Updated 2 months ago
- ESXi Cyber Security Incident Response Script☆19Updated 2 weeks ago
- Baseline a Windows System against LOLBAS☆22Updated 4 months ago
- ☆34Updated 6 months ago
- Bloodhound Portable for Windows☆51Updated last year
- ☆31Updated 5 months ago
- A script designed to test passwords against user accounts within an Active Directory environment, offering customizable Account Lockout T…☆14Updated last year
- Detection rule validation☆41Updated 10 months ago
- Simulation of Akira Ransomware with Invoke-AtomicTest☆12Updated 2 months ago
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe☆27Updated 3 months ago
- This project is an Ansible Role to execute Atomic Red Team tests against multiple machines by wrapping Invoke-AtomicRedTeam☆23Updated 2 months ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆81Updated 4 months ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆59Updated 2 months ago
- CIS Benchmark testing of Windows SIEM configuration☆44Updated last year
- ☆29Updated last year
- DEFCON 31☆57Updated 2 months ago
- A tool to support the reporting of Authenticode Certificates by reducing the effort on individuals to report.☆22Updated 3 weeks ago
- Assist analyst and threat hunters to understand Windows authentication logs and to analyze brutforce scenarios.☆18Updated last year
- HashKitty is a user-friendly cross-platform Python wrapper for Hashcat designed to provide an easy password cracking experience for both …☆38Updated 2 months ago