gsiddharth29 / Threat-HuntingView external linksLinks
Threat Hunt Investigation Methodology and Procedure
☆15Jul 11, 2022Updated 3 years ago
Alternatives and similar repositories for Threat-Hunting
Users that are interested in Threat-Hunting are comparing it to the libraries listed below
Sorting:
- Automatically generated Sysmon parser for Azure Sentinel☆17Jan 6, 2026Updated last month
- ☆13Mar 23, 2023Updated 2 years ago
- Winterfell hunt is a python script to perform auto threat hunting for malicious activities in windows OS based on collected data by winte…☆15Jul 23, 2020Updated 5 years ago
- Red Team Server (RTS)☆16Mar 8, 2024Updated last year
- Docker container for running CobaltStrike 4.10☆38Sep 18, 2024Updated last year
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆36Aug 20, 2023Updated 2 years ago
- ☆19Aug 26, 2020Updated 5 years ago
- Library of threat hunts to get any user started!☆48Sep 4, 2020Updated 5 years ago
- High-level Threat Intelligence playbooks☆20Mar 6, 2021Updated 4 years ago
- A complete security assessment tool that supports common web security issues scanning and custom POC | Be sure to read the document befor…☆20Sep 27, 2024Updated last year
- This Repository consists all Public Cheatsheets created by BlackPerl DFIR Content Team☆20Oct 9, 2024Updated last year
- Slides for the talk we presented as UniPi at DefCon's Red Team Village☆23Aug 14, 2022Updated 3 years ago
- This Repository gives the best and possible strategies against hunting the ransomware☆26Aug 23, 2022Updated 3 years ago
- ATLAS - Malware Analysis Description☆21Jun 9, 2023Updated 2 years ago
- An exercise to practice deobfuscating PowerShell Scripts.☆26Feb 10, 2023Updated 3 years ago
- Simple parser to get useful information from AWS S3 logs☆27Sep 5, 2021Updated 4 years ago
- ☆34Aug 23, 2022Updated 3 years ago
- ☆65May 26, 2023Updated 2 years ago
- Final assignment for the course Data Visualization with Python, part of IBM Data Science Professional Certification on Coursera☆11Jun 22, 2020Updated 5 years ago
- Revised shell script for parsing .gnmap, .xml, or .nmap port scan results files to a CSV list, lists of IPs per port, web urls, and a sum…☆13Apr 17, 2020Updated 5 years ago
- ☆11Feb 28, 2022Updated 3 years ago
- Windows Security Logging☆43Jul 17, 2022Updated 3 years ago
- Attack Range to test detection against nativel serverless cloud services and environments☆35Sep 8, 2021Updated 4 years ago
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Jan 1, 2020Updated 6 years ago
- ⚠️ Malware Development training ⚠️☆40Feb 24, 2025Updated 11 months ago
- Command Execution exploiter with an auto connection handling☆32Jun 15, 2022Updated 3 years ago
- This repo is where I store my Threat Hunting ideas/content☆87May 9, 2023Updated 2 years ago
- BIXI is a fast, stable, and powerful DDoS tool designed for efficiency. It supports multiple protocols including TCP, UDP, ICMP, HTTP, an…☆10Apr 9, 2025Updated 10 months ago
- Code repository for "Machine Learning For Red Team Hackers".☆41Feb 5, 2020Updated 6 years ago
- ☆84Aug 18, 2022Updated 3 years ago
- A minimalist Hugo theme that helps you build fully responsive documentation websites for small projects.☆10Oct 19, 2021Updated 4 years ago
- HOCig- Automatic HOC Information Gathering Tool V 1.2☆10May 4, 2021Updated 4 years ago
- ☆10Jul 8, 2024Updated last year
- Hack The Box OSCP-like VMs writeups☆11Oct 11, 2020Updated 5 years ago
- MasTKO is a security tool which detects DNS entries associated with AWS’s EC2 servers susceptible to takeover attack and attempts a takeo…☆11Jun 14, 2023Updated 2 years ago
- ☆12Oct 1, 2024Updated last year
- It is a ML based project developed in python language. It detect and recognize the face and mark attendance of that person. It's good poi…☆10Aug 13, 2023Updated 2 years ago
- ☆14May 14, 2022Updated 3 years ago
- R package for working with data stored within VERIS framework☆13Dec 22, 2015Updated 10 years ago