darkoperator / ThreatHunter-Playbook
A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns by leveraging Windows Events and Sysmon logs.
☆12Updated 7 years ago
Alternatives and similar repositories for ThreatHunter-Playbook:
Users that are interested in ThreatHunter-Playbook are comparing it to the libraries listed below
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 3 years ago
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Updated 4 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 6 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆36Updated 5 years ago
- Collection of scripts and tools that I created to aid in my testing.☆14Updated 2 years ago
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆37Updated 2 years ago
- Web Filter External Enumeration Tool (WebFEET)☆75Updated 10 years ago
- ☆29Updated 6 years ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆30Updated 2 years ago
- ☆18Updated last year
- A tool to catch spoofed NBNS responses.☆50Updated 6 years ago
- A utility for password spraying using kerberos from an untrusted/non-domain joined Kali linux host. Useful for user and KDC/DC enumeratio…☆18Updated last year
- Script to parse multiple Nmap .gnmap exports into various plain-text formats for easy analysis.☆23Updated 10 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆14Updated 6 years ago
- Official Black Hat Arsenal Security Tools Repository☆21Updated 7 years ago
- Six Degrees of Domain Admin☆15Updated 7 years ago
- A powershell script that prints a lot of IP and connection info to the screen☆30Updated 7 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆17Updated 9 years ago
- Brute force password selection for EAP-MD5 authentication exchanges☆21Updated 7 years ago
- Use DNS to hunt for threats including DGAs☆14Updated 9 years ago
- Site for IWS book content☆18Updated 6 years ago
- Comprehensive Pivoting Framework☆20Updated 8 years ago
- Various Python scripts that have come in handy but aren't important enough to get their own repository☆22Updated 3 years ago
- ☆34Updated 6 years ago
- Parses Java Cache IDX files☆39Updated 6 years ago
- Python script to batch query the Tor Relays and Bridges☆36Updated 5 years ago
- Threat Intel and Incident Reponse☆10Updated 6 years ago
- ☆34Updated 4 years ago