Threat Hunt Investigation Methodology and Procedure
☆15Jul 11, 2022Updated 3 years ago
Alternatives and similar repositories for Threat-Hunting
Users that are interested in Threat-Hunting are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Library of threat hunts to get any user started!☆50Sep 4, 2020Updated 5 years ago
- Winterfell hunt is a python script to perform auto threat hunting for malicious activities in windows OS based on collected data by winte…☆15Jul 23, 2020Updated 5 years ago
- ☆13Mar 23, 2023Updated 3 years ago
- Slides for the talk we presented as UniPi at DefCon's Red Team Village☆23Aug 14, 2022Updated 3 years ago
- Automatically generated Sysmon parser for Azure Sentinel☆18Jan 6, 2026Updated 4 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- An exercise to practice deobfuscating PowerShell Scripts.☆26Feb 10, 2023Updated 3 years ago
- This Repository consists all Public Cheatsheets created by BlackPerl DFIR Content Team☆20Oct 9, 2024Updated last year
- ☆38Aug 23, 2022Updated 3 years ago
- Docker container for running CobaltStrike 4.10☆38Sep 18, 2024Updated last year
- This Repository gives the best and possible strategies against hunting the ransomware☆26Aug 23, 2022Updated 3 years ago
- Red Team Server (RTS)☆16Apr 16, 2026Updated 3 weeks ago
- ☆12Jan 5, 2021Updated 5 years ago
- ATLAS - Malware Analysis Description☆21Jun 9, 2023Updated 2 years ago
- Backdooring Claude Code via hooks in settings.json. Authorized use only!☆71Apr 16, 2026Updated 3 weeks ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆14Aug 21, 2022Updated 3 years ago
- Various commands, tools, techniques that you can use to examine live Windows systems for signs of Compromise or for Threat Hunting.Can al…☆15Aug 15, 2022Updated 3 years ago
- ☆11Apr 29, 2022Updated 4 years ago
- This repo is where I store my Threat Hunting ideas/content☆90Mar 20, 2026Updated last month
- DNS Dashboard for hunting and identifying beaconing☆17Jul 29, 2020Updated 5 years ago
- Hundred Days of Yara Challenge☆12Jun 21, 2022Updated 3 years ago
- A minimalist Hugo theme that helps you build fully responsive documentation websites for small projects.☆10Oct 19, 2021Updated 4 years ago
- ☆19Aug 26, 2020Updated 5 years ago
- ☆11Apr 17, 2017Updated 9 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Detection rules and threat hunting queries in Defender XDR and Azure Sentinel☆17Mar 13, 2026Updated last month
- This repo hosts multiple codes, content, checklists etc which can help a penetration tester in a web application auditing.☆21Sep 14, 2023Updated 2 years ago
- Collection of scripts and tools related to the eCTHPv2 exam by INE.☆19Jun 12, 2022Updated 3 years ago
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆33Jan 1, 2020Updated 6 years ago
- Active C2 IoCs☆99Nov 28, 2022Updated 3 years ago
- ☆44Apr 13, 2026Updated 3 weeks ago
- macos-collector - Automated Collection of macOS Forensic Artifacts for DFIR☆43Apr 13, 2026Updated 3 weeks ago
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆154Apr 25, 2022Updated 4 years ago
- Research on Commercial Space Projects☆18Oct 29, 2020Updated 5 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- 一个人的安全笔记。☆13Dec 2, 2021Updated 4 years ago
- Interactive Shells like PsExec, but in Go☆16Apr 30, 2025Updated last year
- Using QRadar API☆20Feb 23, 2018Updated 8 years ago
- ☆18Dec 23, 2024Updated last year
- Resources from the Security Presentation☆13Oct 29, 2024Updated last year
- ☆11Jun 12, 2023Updated 2 years ago
- Various BPF resources, tools, scripts and experiments created while learning more about the eBPF technology.☆23Jul 11, 2022Updated 3 years ago