infosecn1nja / ThreatHunter-PlaybookView external linksLinks
A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.
☆10Jun 13, 2018Updated 7 years ago
Alternatives and similar repositories for ThreatHunter-Playbook
Users that are interested in ThreatHunter-Playbook are comparing it to the libraries listed below
Sorting:
- Wiki to collect Red Team infrastructure hardening resources☆19Jun 18, 2018Updated 7 years ago
- A curated list of awesome threat detection and hunting resources☆20Apr 13, 2019Updated 6 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆14May 15, 2019Updated 6 years ago
- A curated list of resources (books, tutorials, courses, tools and vulnerable applications) for learning about Exploit Development☆12May 29, 2017Updated 8 years ago
- A collection of awesome penetration testing resources, tools and other shiny things☆17Feb 11, 2017Updated 9 years ago
- A curated list of awesome social engineering resources.☆15May 29, 2017Updated 8 years ago
- A curated list of Awesome Threat Intelligence resources☆19Mar 27, 2019Updated 6 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆16Jun 10, 2019Updated 6 years ago
- Small and highly portable detection tests.☆13Apr 13, 2018Updated 7 years ago
- A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.☆18Jul 28, 2022Updated 3 years ago
- A collection of tools developed by other researchers in the Computer Science area to process network traces. All the right reserved for t…☆15Jun 3, 2016Updated 9 years ago
- A curated list of awesome forensic analysis tools and resources☆16Oct 3, 2018Updated 7 years ago
- Convert Empire profiles to Apache mod_rewrite scripts☆29Sep 17, 2019Updated 6 years ago
- A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.☆25Jan 4, 2017Updated 9 years ago
- 🖥️ A reveal.js website for presenting the cyber security basics to humans☆35Apr 15, 2023Updated 2 years ago
- ☆10Mar 4, 2023Updated 2 years ago
- Secure and performant OCI-image builder for Kubernetes☆12Updated this week
- RRFRemote☆10Nov 10, 2024Updated last year
- Control of the Ball and Wheel System with a state-space controller.☆11Feb 27, 2021Updated 4 years ago
- A collection of examples of all sorts in Haxe and OpenFL☆10Jun 14, 2017Updated 8 years ago
- ROBLOX Script - Collection of visuals / wall hacks (Tracers, ESP, Boxes (2D & 3D), Head Dots & Crosshair)☆14Feb 16, 2023Updated 3 years ago
- ☆16Dec 17, 2019Updated 6 years ago
- A React component which can parse JSX and output rendered React Components.☆16May 21, 2019Updated 6 years ago
- This tool combines the power of Ollama (Mistral) with your terminal to turn natural language into real shell commands. Whether you want t…☆17Jan 25, 2026Updated 3 weeks ago
- ☆15Dec 3, 2020Updated 5 years ago
- This is a simple python based CLI project that can map symptoms like Aarogya Setu app. it's also generate report using matplot library an…☆10Dec 28, 2020Updated 5 years ago
- ☆11May 30, 2021Updated 4 years ago
- Primal-Dual Solver for Inverse Problems☆15Mar 24, 2021Updated 4 years ago
- The SDK assets for the XRTK☆10Sep 16, 2022Updated 3 years ago
- 🦉🔬A small PowerShell tool for finding information quickly on malicious IPs or FQDNs. Powershell threat hunting.☆11Jan 9, 2020Updated 6 years ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆12Oct 6, 2020Updated 5 years ago
- ☆10Mar 23, 2023Updated 2 years ago
- A curated list of awesome threat detection and hunting resources☆10Mar 23, 2018Updated 7 years ago
- Unofficial Easypanel JS SDK☆13Nov 28, 2023Updated 2 years ago
- Tool used to create ADI Kuiper Linux userspace images☆18Updated this week
- Reference list for my Ransomware exploitation research. Lists current DLLs I have seen to date that some ransomware search for, which I h…☆11Jul 16, 2022Updated 3 years ago
- A series of simulation codes used to emulate quantum-like networks in the simulation of emergent adaptive behavior, such as network sync…☆13Oct 22, 2025Updated 3 months ago
- Documentos elaborados en la Coordinación de Proyectos e Investigaciones de Ciberseguridad☆10Apr 25, 2018Updated 7 years ago
- This repository contain all sources for Kaisen Linux alpha and beta ISO (packages, themes, icons, menus, launchers...)☆11Jun 8, 2020Updated 5 years ago