Data Driven Threat Hunting on the RaspberryPi
☆32Jan 26, 2022Updated 4 years ago
Alternatives and similar repositories for piHunter
Users that are interested in piHunter are comparing it to the libraries listed below
Sorting:
- ☆13Feb 6, 2018Updated 8 years ago
- ☆19Oct 28, 2018Updated 7 years ago
- A learning and testing environment for web application hacking and pentesting.☆27Jan 2, 2021Updated 5 years ago
- Threat Intelligence Analysis workflows built with n8n and integrated in SecurityOnion☆32Nov 13, 2025Updated 3 months ago
- OSINT Bookmarks for Firefox / Chrome / Edge / Safari☆66May 24, 2020Updated 5 years ago
- CrowdStrike Falcon Queries For Advanced Threat Detection☆34Mar 1, 2025Updated last year
- DDTTX Tabletop Trainings☆28Sep 23, 2021Updated 4 years ago
- Community content for LogRhythm Axon. Includes Dashboards, searches, analytics rules, processing policies and more.☆10Jul 26, 2024Updated last year
- Ruins & Riches Ultima Online Server Files☆10Oct 15, 2023Updated 2 years ago
- Azure Deployment Templates for Mandiant Managed Huning☆12Jun 1, 2023Updated 2 years ago
- Powershell scripts using CyCLI.☆10May 22, 2019Updated 6 years ago
- Just another tool to extract Indicator of compromise (ioc) from files☆29Oct 1, 2015Updated 10 years ago
- This is a gui interface for airmon-ng☆14Mar 23, 2023Updated 2 years ago
- Deploy your DNS configuration using GitHub Actions using DNSControl.☆11Feb 19, 2026Updated 2 weeks ago
- Examples for the CyCLI Powershell module☆12Mar 8, 2019Updated 6 years ago
- Threat Network Detection in Online Social Networks☆10Jan 20, 2017Updated 9 years ago
- The Office 365 data Splunk app enables data analysts and IT administrators to import the data they need to get their organization more pr…☆16Jun 14, 2023Updated 2 years ago
- CyberArk Credentials Provider (CCP) Plugin for HashiCorp Vault☆17Jan 12, 2024Updated 2 years ago
- Some YARA rules i will add from time to time☆12May 31, 2019Updated 6 years ago
- Corelight@Home script☆46Oct 5, 2023Updated 2 years ago
- A fast pure-Python search engine☆12Apr 9, 2009Updated 16 years ago
- Siri-Clone for Raspberry Pi☆11Feb 17, 2014Updated 12 years ago
- Registry Based Artifact Collection and Correlation☆10Aug 18, 2015Updated 10 years ago
- Active Response plugin. Osquery to execute wazuh/ossec active response plugins. You can write your own plugins, easy to plug☆11Jun 20, 2020Updated 5 years ago
- All my POC related to malware development☆15Feb 19, 2026Updated 2 weeks ago
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆11Sep 21, 2022Updated 3 years ago
- ArduiPi is a shield for Raspberry Pi that brings Arduino low level extented I/O to Raspberry Pi☆23Mar 22, 2014Updated 11 years ago
- Automated CyberArk Privileged Session Manager SSH Proxy Installer.☆13Apr 14, 2023Updated 2 years ago
- Security Onion Splunk App☆10May 18, 2015Updated 10 years ago
- ☆11May 2, 2022Updated 3 years ago
- Build your own threat hunting maturity model☆11Oct 29, 2017Updated 8 years ago
- a github repo that will be used for teaching bash optimizations in a youtube series☆10Jul 6, 2021Updated 4 years ago
- Steam scripts for Outlands shard☆10Feb 15, 2020Updated 6 years ago
- TWRP device tree for ZTE Axon 7 (ailsa_ii)☆12Mar 7, 2022Updated 3 years ago
- Indicator of Compromise Mapping Service☆12Apr 15, 2014Updated 11 years ago
- A collection of Ansible automation roles for my homelab.☆12Jan 17, 2025Updated last year
- This directory contains random scripts from threat hunting or malware research☆11Feb 15, 2018Updated 8 years ago
- ☆10Jan 30, 2026Updated last month
- Various Atlassian Confluence related tools☆19Feb 19, 2026Updated 2 weeks ago