filipi86 / Threat-HuntingLinks
The purpose of these documents, it was to execute several efficiency and detection tests in some endpoint solutions, this document brings the result of the defensive security analysis with an offensive mindset performed in the execution many different Malwares in our lab environment.
☆18Updated 4 years ago
Alternatives and similar repositories for Threat-Hunting
Users that are interested in Threat-Hunting are comparing it to the libraries listed below
Sorting:
- Repo to hold my PowerShell Scripts☆17Updated 2 years ago
- This Repository gives the best and possible strategies against hunting the ransomware☆26Updated 3 years ago
- Linux Baseline and Forensic Triage Tool - BETA☆57Updated 3 years ago
- Repository for different Windows DFIR related CMDs, PowerShell CMDlets, etc, plus workshops that I did for different conferences or event…☆78Updated 4 years ago
- Small enough to carry on your back (Backpack) 🎒💻☆32Updated 2 years ago
- Detection rule validation☆41Updated last year
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆61Updated last year
- Notes from my "Implementing a Kick-Butt Training Program: Blue Team GO!" talk☆12Updated 6 years ago
- Bloodhound Portable for Windows☆53Updated 2 years ago
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆102Updated last year
- A full analysis report detailing as much as possible of a Malware or a Threat☆30Updated last year
- SMBMap is a handy SMB enumeration tool - here with Kerberos support☆73Updated 3 years ago
- Simple Script to Help You Find All Files Has Been Modified, Accessed, and Created In A Range Time.☆27Updated 2 years ago
- ☆47Updated 4 months ago
- This repo is where I store my Threat Hunting ideas/content☆88Updated 2 years ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆54Updated 9 months ago
- ☆33Updated last year
- A GUI to query the API of abuse.ch.☆70Updated 3 years ago
- Threat Hunt Investigation Methodology and Procedure☆15Updated 3 years ago
- A network logging tool that logs per process activities☆32Updated 2 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆19Updated last year
- Resources for AD penetration testing and security☆32Updated 3 years ago
- ☆32Updated 2 years ago
- Various commands, tools, techniques that you can use to examine live Windows systems for signs of Compromise or for Threat Hunting.Can al…☆12Updated 3 years ago
- ☆14Updated 3 years ago
- This script enhances endpoint logging telemetry for the purpose of advanced malware threat detection or for building detections or malwar…☆33Updated 5 months ago
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆27Updated 2 years ago
- CarbonBlack EDR detection rules and response actions☆71Updated 11 months ago
- ☆19Updated 3 years ago
- ☆21Updated 2 years ago