fl0x2208 / ThreatHunting
An informational repo about hunting for adversaries in your IT environment.
☆14Updated 7 years ago
Alternatives and similar repositories for ThreatHunting:
Users that are interested in ThreatHunting are comparing it to the libraries listed below
- OSSEC Decoder & Rulesets for Sysmon Events☆15Updated 9 years ago
- mindmap created for tools can be used during analysis/investigation☆27Updated 8 years ago
- Home to the ActorTrackr source code☆24Updated 7 years ago
- Validate IOC from MISP ; Export results and iocs to SIEM and sensors using syslog and CEF format☆14Updated 8 years ago
- Python script to pull various IOCs from PDFs☆15Updated 10 years ago
- Indices for courses in SANS' Network Security Operations curriculum☆15Updated 9 years ago
- A collection of Python utilities for use in scripts related to working with "indicators of compromise" (IOCs).☆17Updated 6 years ago
- ☆12Updated 5 years ago
- Use DNS to hunt for threats including DGAs☆14Updated 9 years ago
- Checks observables/ioc in TheHive/Cortex against the MISP warningslists☆14Updated 7 years ago
- ☆17Updated 7 years ago
- Synopsis is a tool to aid analysts reviewing browser history files by providing a high-level “synopsis” of key information.☆20Updated 6 years ago
- Tool to parse SRU database☆24Updated 6 years ago
- This package allows for creating alerts in The Hive from emails retrieved from a Microsoft Exchange mailbox.☆12Updated 7 years ago
- This is a repository from Adam Swan and I's presentation on Windows Logs Zero 2 Hero.☆22Updated 7 years ago
- ☆39Updated 5 years ago
- Performs OCR on image files and scans them for matches to YARA rules☆40Updated 6 years ago
- CRITs IOC Visualization in Maltego☆28Updated 10 years ago
- Integrating Sysinternals Autoruns’ logs into Security Onion☆31Updated 11 months ago
- Log Examination Tool☆26Updated 8 years ago
- Site for IWS book content☆18Updated 6 years ago
- Powershell Functions to interact with TheHive-Project☆10Updated 5 years ago
- Utilizing your Threat data from a MISP instance into CarbonBlack Response by exposing the data in the Threat Intelligence Feed.☆19Updated 2 years ago
- IOC Management and Visualization Tool☆47Updated 2 years ago
- Evidence Fetcher (efetch) is a web-based file explorer, viewer, and analyzer.☆37Updated 4 years ago
- Quick script to build host or investigation timelines using Carbon Black Response☆12Updated 6 years ago
- Splunk App to assist Sysmon Threat Hunting☆38Updated 7 years ago
- Cyber Intel Management☆48Updated 7 years ago
- References for FIRST CTI 2019 Symposium presentation☆23Updated 5 years ago
- Tools to search through massive amounts of data☆21Updated 3 months ago