darkoperator / ThreatHunter-PlaybookLinks
A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns by leveraging Windows Events and Sysmon logs.
☆12Updated 8 years ago
Alternatives and similar repositories for ThreatHunter-Playbook
Users that are interested in ThreatHunter-Playbook are comparing it to the libraries listed below
Sorting:
- FireEye iSIGHT Alert Feeder for TheHive, an Open Source and Free Security Incident Response Platform☆16Updated 7 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆14Updated 7 years ago
- ☆53Updated 7 years ago
- PowerShell Memory Pulling script☆19Updated 10 years ago
- DeployREMnux is a Python script that will deploy a cloud instance of the public REMnux distribution in the Amazon cloud (AWS).☆16Updated 5 years ago
- MacOS incident Response Toolkit. Mostly written while stuck on a NJTransit train.☆20Updated 5 years ago
- Threat Intel and Incident Reponse☆10Updated 7 years ago
- This repo is dedicated to all my tricks, tweaks and modules for testing and hunting threats. This repo contains multiple directories whic…☆57Updated 7 years ago
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Updated 4 years ago
- Python script to batch query the Tor Relays and Bridges☆36Updated 6 years ago
- Plugins to add funtionality to ProcDOT. http://www.procdot.com☆25Updated 2 years ago
- malicious file maker/sender to create and send malicious attachments to test your email filter/alerting☆70Updated 8 years ago
- Identify compromised domains or emails. A python based HIBP and HackedEmails wrapper☆38Updated 7 years ago
- Create an incident response triage toolkit for use with Windows or Linux.☆18Updated 5 years ago
- ☆30Updated 7 years ago
- A python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat groups.☆67Updated 7 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆36Updated 6 years ago
- Lootbox downloads open directories shared on Twitter.☆34Updated 4 years ago
- Security Operations Center Multiple Purpose Tool, takes IP address input, conducts OSINT, conducts splunk, bro, fireeye, imperva, and fir…☆21Updated 8 years ago
- Tools for parsing Forensic images☆41Updated 7 years ago
- A script for generating custom passphrase lists to be used for password cracking with hashcat rules☆81Updated 7 years ago
- ☆15Updated 9 years ago
- Bluewall is a firewall framework designed for offensive and defensive cyber professionals.☆106Updated 6 years ago
- ☆81Updated 6 years ago
- ☆76Updated 7 years ago
- Parses Java Cache IDX files☆40Updated 7 years ago
- ☆13Updated 6 years ago
- Splunk app for Threat hunting☆15Updated 7 years ago
- A few transforms and a machine for parsing Nmap XML results☆39Updated 9 years ago
- PortPlow is a distributed port and system scanning & enumeration service. It enables the quick and automated enumeration of ports and ser…☆55Updated last year