Threat Hunt Investigation Methodology and Procedure
☆15Jul 11, 2022Updated 3 years ago
Alternatives and similar repositories for Threat-Hunting
Users that are interested in Threat-Hunting are comparing it to the libraries listed below
Sorting:
- ☆13Mar 23, 2023Updated 2 years ago
- Automatically generated Sysmon parser for Azure Sentinel☆18Jan 6, 2026Updated 2 months ago
- Winterfell hunt is a python script to perform auto threat hunting for malicious activities in windows OS based on collected data by winte…☆15Jul 23, 2020Updated 5 years ago
- Red Team Server (RTS)☆16Mar 8, 2024Updated 2 years ago
- Docker container for running CobaltStrike 4.10☆38Sep 18, 2024Updated last year
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆36Aug 20, 2023Updated 2 years ago
- High-level Threat Intelligence playbooks☆20Mar 6, 2021Updated 5 years ago
- Library of threat hunts to get any user started!☆50Sep 4, 2020Updated 5 years ago
- This Repository consists all Public Cheatsheets created by BlackPerl DFIR Content Team☆20Oct 9, 2024Updated last year
- A complete security assessment tool that supports common web security issues scanning and custom POC | Be sure to read the document befor…☆20Sep 27, 2024Updated last year
- Slides for the talk we presented as UniPi at DefCon's Red Team Village☆23Aug 14, 2022Updated 3 years ago
- This Repository gives the best and possible strategies against hunting the ransomware☆26Aug 23, 2022Updated 3 years ago
- ATLAS - Malware Analysis Description☆21Jun 9, 2023Updated 2 years ago
- An exercise to practice deobfuscating PowerShell Scripts.☆26Feb 10, 2023Updated 3 years ago
- ☆36Aug 23, 2022Updated 3 years ago
- Simple parser to get useful information from AWS S3 logs☆27Sep 5, 2021Updated 4 years ago
- ☆65May 26, 2023Updated 2 years ago
- Revised shell script for parsing .gnmap, .xml, or .nmap port scan results files to a CSV list, lists of IPs per port, web urls, and a sum…☆13Apr 17, 2020Updated 5 years ago
- Final assignment for the course Data Visualization with Python, part of IBM Data Science Professional Certification on Coursera☆11Jun 22, 2020Updated 5 years ago
- ☆11Feb 28, 2022Updated 4 years ago
- Windows Security Logging☆43Jul 17, 2022Updated 3 years ago
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Jan 1, 2020Updated 6 years ago
- ⚠️ Malware Development training ⚠️☆40Feb 24, 2025Updated last year
- Command Execution exploiter with an auto connection handling☆32Jun 15, 2022Updated 3 years ago
- BIXI is a fast, stable, and powerful DDoS tool designed for efficiency. It supports multiple protocols including TCP, UDP, ICMP, HTTP, an…☆10Apr 9, 2025Updated 11 months ago
- Code repository for "Machine Learning For Red Team Hackers".☆41Feb 5, 2020Updated 6 years ago
- ☆84Aug 18, 2022Updated 3 years ago
- It is a ML based project developed in python language. It detect and recognize the face and mark attendance of that person. It's good poi…☆10Aug 13, 2023Updated 2 years ago
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆154Apr 25, 2022Updated 3 years ago
- R package for working with data stored within VERIS framework☆13Dec 22, 2015Updated 10 years ago
- Hack The Box OSCP-like VMs writeups☆11Oct 11, 2020Updated 5 years ago
- ☆10Jul 8, 2024Updated last year
- ☆12Oct 1, 2024Updated last year
- A minimalist Hugo theme that helps you build fully responsive documentation websites for small projects.☆10Oct 19, 2021Updated 4 years ago
- HOCig- Automatic HOC Information Gathering Tool V 1.2☆10May 4, 2021Updated 4 years ago
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆40Jan 7, 2023Updated 3 years ago
- ☆12Jan 5, 2021Updated 5 years ago
- A tool for generating reverse shell payloads on the fly.☆10Jun 18, 2022Updated 3 years ago
- Gradio chat interface for FastMLX☆12Sep 22, 2024Updated last year