darkoperator / ThreatHunter-Playbook
A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns by leveraging Windows Events and Sysmon logs.
☆12Updated 7 years ago
Related projects ⓘ
Alternatives and complementary repositories for ThreatHunter-Playbook
- Collection of scripts and tools that I created to aid in my testing.☆14Updated 2 years ago
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Updated 3 years ago
- Various Python scripts that have come in handy but aren't important enough to get their own repository☆22Updated 3 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆35Updated 5 years ago
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆37Updated last year
- Security Operations Center Multiple Purpose Tool, takes IP address input, conducts OSINT, conducts splunk, bro, fireeye, imperva, and fir…☆21Updated 7 years ago
- Web Filter External Enumeration Tool (WebFEET)☆75Updated 10 years ago
- ☆29Updated 6 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 6 years ago
- Password Guessing for different Web Portals☆29Updated 6 years ago
- Official Black Hat Arsenal Security Tools Repository☆21Updated 7 years ago
- A tool to catch spoofed NBNS responses.☆49Updated 6 years ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆30Updated 2 years ago
- Veil 3.1.X (Check version info in Veil at runtime)☆14Updated 5 years ago
- A utility for password spraying using kerberos from an untrusted/non-domain joined Kali linux host. Useful for user and KDC/DC enumeratio…☆18Updated last year
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 3 years ago
- Python script to batch query the Tor Relays and Bridges☆36Updated 5 years ago
- Fingerprint a web app using local files as the fingerprint sources☆36Updated 7 years ago
- B-Sides CBR 2018 talk about group policy and Grouper☆39Updated 5 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆14Updated 6 years ago
- Comprehensive Pivoting Framework☆20Updated 8 years ago
- Passive recon / OSINT automation script☆40Updated 6 years ago
- A powershell script that prints a lot of IP and connection info to the screen☆30Updated 7 years ago
- Scripts to help hunt for possible golden/silver TGT tickets☆16Updated 7 years ago
- Password spraying script and helper for creating password lists☆33Updated 4 years ago
- Plugins to add funtionality to ProcDOT. http://www.procdot.com☆22Updated last year
- PowerShell Memory Pulling script☆19Updated 9 years ago
- ☆12Updated 8 years ago
- Use DNS to hunt for threats including DGAs☆14Updated 8 years ago