cyb3rmik3 / Hunting-Lists
A repository of curated lists with elements such as IoCs to use for threat hunting & detection queries.
☆34Updated 8 months ago
Alternatives and similar repositories for Hunting-Lists:
Users that are interested in Hunting-Lists are comparing it to the libraries listed below
- MS Graph Commands and Tools for Blue Teamers☆49Updated last year
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆51Updated 3 months ago
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆51Updated last year
- Baseline a Windows System against LOLBAS☆25Updated 10 months ago
- Domain Response is a tool that is designed to help you automate the investigation for a domain. This tool is specificly designed to autom…☆47Updated 11 months ago
- Data breaches, Leaks, Malwares Forums List <Please Use Vpn/TOR don't click on Link directly bad OPSEC>☆48Updated 2 weeks ago
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆71Updated 2 months ago
- ☆22Updated last month
- CarbonBlack EDR detection rules and response actions☆71Updated 6 months ago
- Detection rule validation☆41Updated last year
- ASR Configurator, Essentials and Atomic Testing☆37Updated 4 months ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated last year
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆36Updated 2 months ago
- A simple tool designed to create Atomic Red Team tests with ease.☆38Updated 2 weeks ago
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆32Updated 4 months ago
- Sigma detection rules for hunting with the threathunting-keywords project☆55Updated 3 weeks ago
- DEFCON 31 slide deck and video link☆58Updated 8 months ago
- A practical resource on using open-source tools for Incident Response. This repo shares workflows, tool setups, and steps for responding …☆28Updated 4 months ago
- ☆31Updated this week
- ☆32Updated 11 months ago
- Living off the False Positive!☆35Updated last month
- Slides of my public talks☆54Updated last year
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆81Updated 10 months ago
- create a "simulated internet" cyber range environment☆15Updated last week
- Pythia is a versatile query format designed to facilitate the discovery of malicious infrastructure by seamlessly converting into the syn…☆32Updated 7 months ago
- Table of AD and Azure assets and whether they belong to Tier Zero☆26Updated last year
- Simulation of Akira Ransomware with Invoke-AtomicTest☆14Updated 8 months ago
- Advanced Email Threat Hunting w/ Detection as Code☆52Updated last month
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆60Updated 8 months ago
- Tools and scripts to deploy and manage OpenRelik instances☆13Updated 3 weeks ago