cyb3rmik3 / Hunting-ListsView external linksLinks
A repository of curated lists with elements such as IoCs to use for threat hunting & detection queries.
☆33Jul 23, 2024Updated last year
Alternatives and similar repositories for Hunting-Lists
Users that are interested in Hunting-Lists are comparing it to the libraries listed below
Sorting:
- GitHub landing page repo☆12Mar 21, 2025Updated 10 months ago
- ☆11Dec 9, 2025Updated 2 months ago
- Cobalt Strike random C2 Profile generator☆16Nov 10, 2025Updated 3 months ago
- Repository with Sample threat hunting notebooks on Security Event Log Data Sources☆69Dec 2, 2022Updated 3 years ago
- A repository of KQL queries focused on threat hunting and threat detecting for Microsoft Sentinel & Microsoft XDR (Former Microsoft 365 D…☆754Aug 28, 2025Updated 5 months ago
- Browser Bookmark that will ask for keyword(s) and then color highlight these words on the webpage you visit☆12Nov 15, 2023Updated 2 years ago
- Pentest report writing guide☆18Sep 24, 2023Updated 2 years ago
- really ?☆12Feb 29, 2024Updated last year
- Sigma detection rules for hunting with the threathunting-keywords project☆58Mar 2, 2025Updated 11 months ago
- Powershell collection designed to assist in Threat Hunting Windows systems.☆27Apr 13, 2018Updated 7 years ago
- A web scraper to create MISP events and reports☆17Jun 30, 2025Updated 7 months ago
- SNMP Bash Script to discover valid community strings, dump basic information, check for write permission and check for RCE.☆11Apr 27, 2024Updated last year
- 🐻❄️ 🏹 Threat hunting with Polars and flaws.cloud AWS CloudTrail datasets.☆14May 22, 2024Updated last year
- Sniffing files generator☆61Feb 24, 2025Updated 11 months ago
- Cheat sheets for threat hunting, detection and other stuff.☆34Oct 7, 2022Updated 3 years ago
- ☆30Jan 13, 2026Updated last month
- A command-line tool for reconnaissance and targeted write operations on Confluence and Jira instances.☆13Jan 15, 2025Updated last year
- Custom mini tools during Red Teaming engagements☆23Jan 20, 2026Updated 3 weeks ago
- This repository contains generated contextual data utilized by pyattck.☆19Mar 3, 2025Updated 11 months ago
- A curated list of resources for DFIR through Microsoft Defender for Endpoint leveraging kusto queries, powershell scripts, tools such as …☆421Aug 10, 2025Updated 6 months ago
- Repository for dirty scripts and PoCs☆20Feb 18, 2025Updated 11 months ago
- A Windows tool that converts LDIF files to BloodHound CE☆25Dec 20, 2025Updated last month
- ☆20Nov 6, 2023Updated 2 years ago
- Knowledge base of analytics designed to cover threats based on MITRE's ATT&CK.☆23Dec 13, 2018Updated 7 years ago
- Collection of Jupyter Notebook for Threat Hunting and Blue Team Purposes☆22Jun 15, 2022Updated 3 years ago
- Microsoft Active Directory (AD) Awesome List☆26Feb 27, 2025Updated 11 months ago
- Command-line tool for discovering SaaS platforms a company uses via DNS enumeration☆35Jul 23, 2025Updated 6 months ago
- This repository contains a framework of curated Azure penetration testing tools that are specifically designed to help you identify and m…☆22May 13, 2023Updated 2 years ago
- Most Responder's configuration power in your hand.☆53Jan 19, 2025Updated last year
- Python library for Google Safe Browsing v2 Lookup API☆25Jan 25, 2022Updated 4 years ago
- Easy peasy file uploads☆33Aug 29, 2025Updated 5 months ago
- Step-by-step documentation on how to decrypt SCCM database secrets offline☆50Oct 20, 2025Updated 3 months ago
- My personal experience in Threat Hunting and knowledge gained so far.☆19May 27, 2017Updated 8 years ago
- Parses Cobalt Strike malleable C2 profiles.☆60Feb 7, 2026Updated last week
- Modern PIC implant for Windows (64 & 32 bit)☆105Jul 23, 2025Updated 6 months ago
- A dataset containing Office 365 Unified Audit Logs for security research and detection☆60Jun 7, 2022Updated 3 years ago
- Provides an advanced baseline to implement a secure Windows auditing strategy on Windows OS.☆60Jun 9, 2025Updated 8 months ago
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆57Apr 14, 2025Updated 10 months ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆83Apr 27, 2024Updated last year