fl0x2208 / Memoirs-of-a-Threat-Hunter
My personal experience in Threat Hunting and knowledge gained so far.
☆19Updated 7 years ago
Related projects ⓘ
Alternatives and complementary repositories for Memoirs-of-a-Threat-Hunter
- Quick & dirty script to get info on a file from online resources (VirusTotal, Team Cymru, Shadow Server etc.)☆30Updated 10 years ago
- ☆16Updated 9 years ago
- Command-line Interface for Binar.ly☆37Updated 7 years ago
- This repository is a curated list of pro bono incident response entities.☆19Updated last year
- Plugins to add funtionality to ProcDOT. http://www.procdot.com☆22Updated last year
- IDS Utility Belt For Automating/Testing Various Things☆30Updated 4 years ago
- Automation for VirusTotal☆31Updated 8 years ago
- Multiple rules for yara-project for detect compiler/packer/protector☆33Updated 4 years ago
- Threat Intel and Incident Reponse☆10Updated 6 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 6 years ago
- Force-Directed Graph Generator for Volatility Ouputs☆26Updated 5 years ago
- Yara intergrated into BurpSuite☆46Updated 8 years ago
- A Maltego transform and machine to identify possible phishing vectors using permutated domains☆15Updated 9 years ago
- ☆22Updated 6 years ago
- Tools☆13Updated last year
- Detect malicious domain, Blablablablabla☆26Updated 7 years ago
- Crawl certificate information from censys☆8Updated 8 years ago
- How can you track the hunting techniques you come up with?☆13Updated 7 years ago
- Fingerprint a web app using local files as the fingerprint sources☆36Updated 7 years ago
- (Unofficial) Python API for https://sslbl.abuse.ch/☆11Updated 7 years ago
- Exfiltration Framework - Exfiltration modeling tool written in Python. Naisho attempts to avoid detection from DLP, IPS/IDS egress filter…☆37Updated 10 years ago
- ☆19Updated 6 years ago
- Performs OCR on image files and scans them for matches to YARA rules☆40Updated 6 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆40Updated 4 years ago
- Extract information from MISP via the API☆15Updated 8 years ago