A project designed to make the operationalization of open-source cyber threat intelligence more efficient.
☆17Apr 13, 2026Updated last week
Alternatives and similar repositories for hunting-packages
Users that are interested in hunting-packages are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- introduction to distributed scanning using vultr☆11Apr 29, 2017Updated 8 years ago
- Jupyter Notebooks for Digital Forensics & Incident Response☆10Nov 23, 2021Updated 4 years ago
- Rigorously evaluating autonomous systems for cybersecurity at scale☆30Jul 9, 2025Updated 9 months ago
- A quick reference guide for python script development in DFIR☆17Mar 20, 2024Updated 2 years ago
- Common Malware Techniques☆13Mar 26, 2023Updated 3 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- This repo is all about Blue teamming and CyberDefenders Write-up for their DFIR challenges☆19Nov 5, 2023Updated 2 years ago
- R interface to the Censys "cyber"/scans search engine • https://www.censys.io/tutorial☆14Aug 9, 2022Updated 3 years ago
- A web API for various cyber threat intelligence frameworks, including MITRE ATT&CK, CWE, ATLAS...☆19Apr 9, 2026Updated last week
- A guide to setting up Windows and MacOS the way I like it☆22Jun 25, 2025Updated 9 months ago
- My Notes from Hugging Face AI Agents Course☆19Feb 18, 2025Updated last year
- Threat Hunting is time consuming enough as it is. Coming up with and tracking metrics to justify your hunt team to the Execs often takes…☆13Dec 7, 2022Updated 3 years ago
- Convert your spreadsheet or CSV for the GIAC exam to a more compact index. Inspired by Voltaire and usable offline.☆21Jun 6, 2025Updated 10 months ago
- My Gitbook CyberSec Notes☆21Oct 22, 2025Updated 5 months ago
- AIL project training materials☆39Feb 24, 2026Updated last month
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A community-driven repository for threat hunting ideas, methodologies, and research that serves as a central gathering place for hunters …☆308Updated this week
- This repository is a comprehensive collection of resources, documentation, apps, and add-ons related to Splunk, a powerful data analytics…☆25Updated this week
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆11Nov 24, 2023Updated 2 years ago
- API to access the Redis database of a BGP Ranking instance.☆17Dec 11, 2017Updated 8 years ago
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Jan 1, 2020Updated 6 years ago
- Tracking and documenting monthly insights about hacktivist coalitions.☆23Sep 14, 2025Updated 7 months ago
- A detailed list of potentially dangerous file extensions☆18Jun 18, 2025Updated 10 months ago
- a simple powershell wrapper to automate checking a user's access around the network☆13Dec 5, 2023Updated 2 years ago
- ☆15Jun 5, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆46Jun 1, 2025Updated 10 months ago
- GitHub action to run Threagile, the agile threat modeling toolkit, on a repo's threagile.yaml file☆14May 3, 2024Updated last year
- Cradlepoint ECM Command Line Interface☆11Mar 7, 2023Updated 3 years ago
- Mem2Img: Memory-Resident Malware Detection via Convolution Neural Network☆25May 6, 2021Updated 4 years ago
- CERTITUDE - A python package to classify malicious URLs☆20May 16, 2022Updated 3 years ago
- Extract machine readable cyber threat intelligence from unstructured data (inc. PDFs, Word docs, and HTML pages)☆38Updated this week
- Cleanup of older MISP events can require some work until now☆28Apr 5, 2026Updated 2 weeks ago
- Process Dumper written entirely in VBA.☆25Feb 13, 2021Updated 5 years ago
- A curated list of awesome threat detection and hunting resources☆10Mar 23, 2018Updated 8 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- The CAPTCHA-resilient contact scraper.☆50Nov 18, 2025Updated 5 months ago
- ☆16May 15, 2025Updated 11 months ago
- ☆66Jan 8, 2026Updated 3 months ago
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆46Feb 13, 2026Updated 2 months ago
- Reaque is an mobile tool where we can share and find things related to Mozambique, the people and things there. From reflections and cult…☆13Sep 10, 2019Updated 6 years ago
- T&C and Privacy Policy for our website: https://radicallyopensecurity.com/☆17Dec 9, 2024Updated last year
- My dot files and other profile settings☆18Updated this week