Threat Hunting is time consuming enough as it is. Coming up with and tracking metrics to justify your hunt team to the Execs often takes time away from your Threat Hunting. I have created this Excel document to help automate as much of that as possible. The Strategic Overview tab is auto-updated based upon what you enter in the Threat Hunts Ta…
☆13Dec 7, 2022Updated 3 years ago
Alternatives and similar repositories for Threat-Hunting-Metrics
Users that are interested in Threat-Hunting-Metrics are comparing it to the libraries listed below
Sorting:
- Public Chronicle Detection Rules☆12Apr 25, 2023Updated 2 years ago
- A Ghidra script to improve decompiled code readability by re-writing it (Using DeepSeek) in a better way, Along with renaming/assigning v…☆19Oct 8, 2025Updated 5 months ago
- Analyst Tool to automate some of an analyst's daily investigation tasks. In both python script and Jupyter Notebook format.☆15Nov 24, 2025Updated 3 months ago
- Common Malware Techniques☆13Mar 26, 2023Updated 2 years ago
- A cybersecurity game in Azure Data Explorer☆174Jul 12, 2024Updated last year
- Speeding up identifying which binaries with a SUID flag may lead to root access☆15Aug 26, 2024Updated last year
- C2 Active Scanner☆59Jun 19, 2024Updated last year
- Wi-Fi Hacking Workshop☆14Dec 27, 2020Updated 5 years ago
- Spacehuhn Wiki Source☆13Apr 27, 2023Updated 2 years ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- Reference sheet for Threat Hunting Professional Course☆26Mar 10, 2019Updated 7 years ago
- ☆10Jul 1, 2023Updated 2 years ago
- Pritunl Zero Docker image☆18Nov 12, 2025Updated 4 months ago
- Jupyter Notebooks for Cyber Threat Intelligence☆35Sep 14, 2023Updated 2 years ago
- ☆14Dec 15, 2023Updated 2 years ago
- The project was moved here https://github.com/atomic-threat-coverage/atomic-threat-coverage☆25Aug 12, 2019Updated 6 years ago
- Mobirise plugin using Google Firebase☆10Oct 6, 2017Updated 8 years ago
- Supercharged USB bootloader for various PIC24/dsPIC33 MCUs.☆11Jul 8, 2021Updated 4 years ago
- Jupyter notebooks for threat hunting☆60Mar 26, 2025Updated 11 months ago
- Bulk Xbox Live Gamertag availability checker.☆14Mar 9, 2019Updated 7 years ago
- ☆13Mar 29, 2021Updated 4 years ago
- Class☆10Nov 10, 2020Updated 5 years ago
- A password spraying tool for Microsoft Online accounts (Azure/O365). The script logs if a user cred is valid, if MFA is enabled on the ac…☆19Apr 11, 2022Updated 3 years ago
- List of Red Team Resources☆17Jun 16, 2020Updated 5 years ago
- A Python library to help with some common threat hunting data analysis operations☆142Apr 23, 2023Updated 2 years ago
- An accurated list of things to test while pentesting☆11Jan 2, 2021Updated 5 years ago
- Search an entire directory of .eml email files for a word or phrase... in over 100 languages.☆12Feb 28, 2023Updated 3 years ago
- Repo of KC7 challenge scenarios☆27Aug 30, 2025Updated 6 months ago
- A Claude Code skill for using picocom to give access to a live UART shell for enumeration, pentesting, etc.☆42Oct 20, 2025Updated 5 months ago
- a keep-alive agent for node http & https with a really snappy name☆32May 2, 2017Updated 8 years ago
- ☆15Jun 5, 2024Updated last year
- Web interface for monitoring and interacting with Netflow data stored in Silk repositories.☆13Mar 24, 2019Updated 6 years ago
- Easy-to-use C++ library for the new Linux GPIO API☆12Dec 10, 2020Updated 5 years ago
- Some YARA rules i will add from time to time☆12May 31, 2019Updated 6 years ago
- Small web frontend for using openAI's GPT-3.5 and GPT-4's API☆59Apr 9, 2025Updated 11 months ago
- MDE relies on some of the Audit settings to be enabled☆100Jul 15, 2022Updated 3 years ago
- A project designed to make the operationalization of open-source cyber threat intelligence more efficient.☆17Updated this week
- My collection of Bookmarks☆13Dec 29, 2025Updated 2 months ago
- Defanger is a Notepad++ plugin that defangs/refangs malicious IOCs.☆25Jun 18, 2023Updated 2 years ago