pocket guide for core threat hunting concepts
☆23May 6, 2020Updated 5 years ago
Alternatives and similar repositories for threat-hunting-pocket-guide
Users that are interested in threat-hunting-pocket-guide are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A project in Golang that will create prefix-based magic MD5 hashes for type juggling.☆21Jul 29, 2018Updated 7 years ago
- RELK -- The Research Elastic Stack (Kafka, Beats, Zookeeper, Logstash, ElasticSearch, Kibana, Spark, & Jupyter -- All in Docker)☆27Nov 7, 2019Updated 6 years ago
- Python script to automatically create sigma rules from The hive observables☆25Mar 17, 2019Updated 7 years ago
- ☆15Sep 24, 2024Updated last year
- Appendix resources for Intrinsec's "Amélioration des capacités de détection" handbook.☆13Mar 26, 2018Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Powershell collection designed to assist in Threat Hunting Windows systems.☆27Apr 13, 2018Updated 7 years ago
- A set of tools for collecting forensic information☆28Apr 4, 2020Updated 6 years ago
- QEMU with rVMI extensions☆25Jul 25, 2017Updated 8 years ago
- ☆35Jan 22, 2025Updated last year
- Repository resource threat intelligence for SOC☆10Sep 14, 2018Updated 7 years ago
- A cyber threat intelligence server based on TAXII 2 and written in Golang☆32Sep 19, 2019Updated 6 years ago
- a shared short domain for XSS and other hacks☆32Mar 3, 2022Updated 4 years ago
- Converts Sigma detection rules to a Splunk alert configuration.☆12Jul 1, 2021Updated 4 years ago
- certstream + analytics☆11Jan 17, 2020Updated 6 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆13Feb 6, 2018Updated 8 years ago
- A Splunk app with saved reports derived from Sigma rules☆73Apr 24, 2018Updated 7 years ago
- Repository for my ATT&CK analysis research.☆70May 16, 2019Updated 6 years ago
- provides a Suricata Eve output for Kafka with Suricate Eve plugin☆15Nov 25, 2021Updated 4 years ago
- A tool for studying JavaScript malware.☆15Mar 31, 2026Updated last week
- Threat Hunter's Knowledge Base☆22Dec 27, 2021Updated 4 years ago
- Various public documents, whitepapers and articles about APT campaigns☆55Apr 1, 2016Updated 10 years ago
- Creating a Feed of MISP Events from ThreatFox (by abuse.ch)☆19Jun 2, 2021Updated 4 years ago
- A collection of typical false positive indicators☆56Dec 5, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Validates yara rules and tries to repair the broken ones.☆41Sep 5, 2020Updated 5 years ago
- FireEye iSIGHT Alert Feeder for TheHive, an Open Source and Free Security Incident Response Platform☆16Oct 12, 2018Updated 7 years ago
- Expert Investigation Guides☆51Mar 18, 2021Updated 5 years ago
- Collection of Jupyter Notebook for Threat Hunting and Blue Team Purposes☆22Jun 15, 2022Updated 3 years ago
- Synthesising graphs and simulating things☆10Oct 25, 2022Updated 3 years ago
- YAFRA is a semi-automated framework for analyzing and representing reports about IT Security incidents.☆27Dec 14, 2021Updated 4 years ago
- A curated list of awesome YARA rules, tools, and people.☆33Oct 26, 2023Updated 2 years ago
- Personal compilation of APT malware from whitepaper releases, documents and own research☆265Feb 7, 2019Updated 7 years ago
- ☆11Jun 4, 2025Updated 10 months ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- ☆349Mar 19, 2021Updated 5 years ago
- Providing timelines based on OSINT Reports☆31Jun 21, 2023Updated 2 years ago
- A utility to trawl phishing domains and attempt to identify phishing kits as well as other malicious activity☆36Jan 14, 2022Updated 4 years ago
- "A Practical Recipe for Hardware Implants" presentation materials.☆13Nov 10, 2020Updated 5 years ago
- dawg the hallway monitor - monitor operating system changes and analyze introduced attack surface when installing software☆55Nov 14, 2019Updated 6 years ago
- Graph Representation of MITRE ATT&CK's CTI data☆51Nov 14, 2019Updated 6 years ago
- Microsoft Flow Attack Framework☆23Nov 14, 2019Updated 6 years ago