A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns by leveraging Windows Events and Sysmon logs.
☆12Apr 13, 2017Updated 8 years ago
Alternatives and similar repositories for ThreatHunter-Playbook
Users that are interested in ThreatHunter-Playbook are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Collection of single use scripts I worte for windows forensics☆27Feb 1, 2012Updated 14 years ago
- A set of compiled application restriction bypasses☆30Mar 15, 2017Updated 9 years ago
- Deep Security's APIs make it simple to integration with a variety of AWS Services☆19Apr 24, 2019Updated 6 years ago
- Parsing MITRE EDR Evaluation results☆12Dec 5, 2018Updated 7 years ago
- Enumerate wordpress users in 1 second.☆15Jan 23, 2018Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Automatically close AWS Accounts when moved to a specific Organizational Unit, such as SuspendedOU or ToBeDeletedOU or BlackHole 😛☆14May 12, 2022Updated 3 years ago
- ☆10Nov 10, 2022Updated 3 years ago
- tmp files from tmp notes as tmp-pocs... ;)☆16Jun 3, 2022Updated 3 years ago
- Visual Studio Code Microsoft Sysinternal Sysmon configuration file extension.☆54Jul 13, 2023Updated 2 years ago
- ☆13Jan 20, 2020Updated 6 years ago
- ☆12Apr 14, 2017Updated 8 years ago
- ☆10Jan 14, 2022Updated 4 years ago
- A minimal Linux that runs as a coreboot or LinuxBoot ROM payload to provide a secure, flexible boot environment for laptops and servers.☆13Apr 7, 2022Updated 3 years ago
- public assets for ironcat emulation software ;)☆14Sep 8, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Registry to JSON. This Project is for learning purposes and is not maintained.☆12Dec 28, 2021Updated 4 years ago
- Explore effective penetration testing techniques with Metasploit☆17Jan 30, 2023Updated 3 years ago
- AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.☆17Oct 27, 2019Updated 6 years ago
- Setup push alerts using Google Scripts and Pushbullet☆10Jun 21, 2017Updated 8 years ago
- Utilities to simplify homebridge camera plugin development☆20Jan 28, 2025Updated last year
- Documentation published at https://docs.pooltogether.com/ on how to use the new PoolTogether protocol.☆12Feb 18, 2022Updated 4 years ago
- ☆13Apr 6, 2016Updated 9 years ago
- Collection of scripts and tools that I created to aid in my testing.☆14Mar 2, 2022Updated 4 years ago
- Windows File Enumeration Intel Gathering Tool.☆17Sep 4, 2023Updated 2 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Lambda job in Python to automatically deploy Inspector agent to newly-launched EC2 instances☆30Jan 14, 2026Updated 2 months ago
- Examples of various Entra ID scenarios in Terraform☆20Sep 24, 2024Updated last year
- Fix the Issue (OS can not detect HDMI monitors)☆12Jul 9, 2021Updated 4 years ago
- A script to analyze geographic GSuite Login activity☆10Sep 3, 2017Updated 8 years ago
- Let's make an arcade game in MS-DOS! series. The game is called Lumberjacks and is loosely based on Timber from Midway in the early 1980…☆13Apr 7, 2018Updated 7 years ago
- Collection of operational focused osquery dashboards.☆11Jan 20, 2021Updated 5 years ago
- Web Sight Front-end Community Edition☆24May 25, 2020Updated 5 years ago
- Network forensics tool to parse pcap and provide visualizations using D3.js☆15Aug 19, 2013Updated 12 years ago
- Check read, write permissions on S3 buckets in your account☆20Jun 20, 2019Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Learn how to get more out of publicly available threat reports to help improve the security posture of your organization! TLP: White Thre…☆15Jun 5, 2023Updated 2 years ago
- LNK to JSON☆14Mar 7, 2019Updated 7 years ago
- AWS EC2 and S3 Security Auditing Tool☆41Feb 19, 2014Updated 12 years ago
- A tool for exploiting Moxie Marlinspike's SSL "stripping" attack.☆18Nov 28, 2013Updated 12 years ago
- recovers and reconstructs fragmented Evtx files from disk images, memory dumps, pagefiles and unallocated space☆13Feb 3, 2015Updated 11 years ago
- A screen-accurate recreation of ctOS 2.0 from Watch_Dogs 2.☆23Oct 21, 2023Updated 2 years ago
- Scripts for Looking up OUIs or Vendor information from MAC addresses☆11Dec 24, 2023Updated 2 years ago