kraven-security / hunting-packagesView external linksLinks
A project designed to make the operationalization of open-source cyber threat intelligence more efficient.
☆17Updated this week
Alternatives and similar repositories for hunting-packages
Users that are interested in hunting-packages are comparing it to the libraries listed below
Sorting:
- This repository contains various threat hunting tools written in Python and is documented in the series Python Threat Hunting Tools which…☆18Nov 16, 2023Updated 2 years ago
- Phishing can't get any easier with Tilapia☆11Jan 2, 2023Updated 3 years ago
- AIL project training materials☆39Jul 17, 2025Updated 6 months ago
- Cradlepoint ECM Command Line Interface☆11Mar 7, 2023Updated 2 years ago
- Save contacts that you want don't want to show on the dailer. Black Book for saving contacts in python☆10Apr 30, 2023Updated 2 years ago
- The purpose of this learning collection is to provide links to get you started on the journey of AI security.☆10Oct 24, 2025Updated 3 months ago
- Comprehensive cybersecurity home lab setup that integrates various technologies and configurations to enhance skills in network security,…☆25Oct 15, 2024Updated last year
- The goal of this repository is to accelerate Azure OpenAI service adoption and put an enterprise governance structure around it using Azu…☆12Sep 13, 2023Updated 2 years ago
- 🏛️ Open-source toolkit for accessing SEC EDGAR financial data with Python and TypeScript/JavaScript SDKs. Features comprehensive parsing…☆24Aug 13, 2025Updated 6 months ago
- Reaque is an mobile tool where we can share and find things related to Mozambique, the people and things there. From reflections and cult…☆13Sep 10, 2019Updated 6 years ago
- Project Interoperability: A Start-Up Guide to Info Sharing☆29Nov 22, 2016Updated 9 years ago
- Powershell payloads for hacking attack. powershell are created for windows automation but hackers use it to hack devices illegally.☆11Aug 6, 2022Updated 3 years ago
- A detailed list of potentially dangerous file extensions☆17Jun 18, 2025Updated 7 months ago
- Welcome to the LLM Tutorials and RAG Implementations repository! This repository provides tutorials, guides, and implementations for work…☆11Jul 1, 2025Updated 7 months ago
- A curated list of awesome threat detection and hunting resources☆10Mar 23, 2018Updated 7 years ago
- Jupyter Notebooks for Digital Forensics & Incident Response☆10Nov 23, 2021Updated 4 years ago
- GitHub action to run Threagile, the agile threat modeling toolkit, on a repo's threagile.yaml file☆14May 3, 2024Updated last year
- The Trader Gateway of Distributed Commodities OTC Electronic Trading System☆13Jun 12, 2018Updated 7 years ago
- GeeekPi UPS restore on power loss feature fix with 555 timer.☆10Dec 16, 2020Updated 5 years ago
- poxyran's blog☆13Aug 27, 2020Updated 5 years ago
- Workaround to use Arduino Leonardo/Micro with german keyboard layout☆11Dec 1, 2020Updated 5 years ago
- introduction to distributed scanning using vultr☆10Apr 29, 2017Updated 8 years ago
- A Python script for generating price databases for various commodities (bitcoin, litecoin, ppcoin, gold, silver, etc.)☆15Jun 3, 2013Updated 12 years ago
- Burp Suite Extension - Trigger actions and reshape HTTP request and response traffic using configurable rules☆19Nov 29, 2024Updated last year
- Proof of Concept OSINT visualization☆12Dec 29, 2017Updated 8 years ago
- Calculate the number of nuclear reactors needed for the energy wasted by cryptocurrency mining☆11Mar 8, 2025Updated 11 months ago
- Collections of services for search data from passengers lists and emigrants records☆12Jun 3, 2022Updated 3 years ago
- A repo that contains links to projects by members of the Digital Forensics Discord Server! This is meant to help promote projects made by…☆15Oct 5, 2023Updated 2 years ago
- A Fusion Systems Code ☀☆12Oct 21, 2018Updated 7 years ago
- My dot files and other profile settings☆18Updated this week
- Collection of port scans of the North Korean IPv4 subnets from different vps☆17Nov 25, 2025Updated 2 months ago
- This repository contains the codes and figures used in the paper "Illuminating Dark Fishing Fleets in North Korea", published in Science …☆16Oct 11, 2020Updated 5 years ago
- Tools used in our 34C3 talk, DPRK Consumer Technology☆18Dec 27, 2017Updated 8 years ago
- Attempt to reproduce paper for crack inspection in nuclear plants from video footage.(see references).☆14Dec 19, 2019Updated 6 years ago
- Customs Import Declaration Datasets☆10Feb 6, 2026Updated last week
- A barebone model built for detecting weapons in an image. It was built using YOLOv2 (You Only Look Once Algo version2). The model is buil…☆11Jul 23, 2019Updated 6 years ago
- A package for hadron resonance gas model applications (current version: 1.5.2)☆18Updated this week
- A C# irc bot malware POC.☆12Jul 29, 2014Updated 11 years ago
- API to access the Redis database of a BGP Ranking instance.☆17Dec 11, 2017Updated 8 years ago