A project designed to make the operationalization of open-source cyber threat intelligence more efficient.
☆17Apr 13, 2026Updated this week
Alternatives and similar repositories for hunting-packages
Users that are interested in hunting-packages are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Jupyter Notebooks for Digital Forensics & Incident Response☆10Nov 23, 2021Updated 4 years ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Aug 4, 2021Updated 4 years ago
- Rigorously evaluating autonomous systems for cybersecurity at scale☆30Jul 9, 2025Updated 9 months ago
- Common Malware Techniques☆13Mar 26, 2023Updated 3 years ago
- R interface to the Censys "cyber"/scans search engine • https://www.censys.io/tutorial☆14Aug 9, 2022Updated 3 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- A web API for various cyber threat intelligence frameworks, including MITRE ATT&CK, CWE, ATLAS...☆19Apr 9, 2026Updated last week
- My Notes from Hugging Face AI Agents Course☆19Feb 18, 2025Updated last year
- Threat Hunting is time consuming enough as it is. Coming up with and tracking metrics to justify your hunt team to the Execs often takes…☆13Dec 7, 2022Updated 3 years ago
- A tool to parse Firefox and Chrome HSTS databases into forensic artifacts!☆25Jan 8, 2026Updated 3 months ago
- Convert your spreadsheet or CSV for the GIAC exam to a more compact index. Inspired by Voltaire and usable offline.☆21Jun 6, 2025Updated 10 months ago
- AIL project training materials☆39Feb 24, 2026Updated last month
- A community-driven repository for threat hunting ideas, methodologies, and research that serves as a central gathering place for hunters …☆308Updated this week
- This repository is a comprehensive collection of resources, documentation, apps, and add-ons related to Splunk, a powerful data analytics…☆25Updated this week
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆11Nov 24, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- API to access the Redis database of a BGP Ranking instance.☆17Dec 11, 2017Updated 8 years ago
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Jan 1, 2020Updated 6 years ago
- Tracking and documenting monthly insights about hacktivist coalitions.☆23Sep 14, 2025Updated 7 months ago
- tryhackme writeups☆13Jun 28, 2020Updated 5 years ago
- A detailed list of potentially dangerous file extensions☆18Jun 18, 2025Updated 10 months ago
- Welcome to the Cloud Security Toolkit repository, your all-in-one destination for cutting-edge cloud security resources! Whether you're d…☆49Mar 8, 2026Updated last month
- a simple powershell wrapper to automate checking a user's access around the network☆13Dec 5, 2023Updated 2 years ago
- ☆15Jun 5, 2024Updated last year
- ☆46Jun 1, 2025Updated 10 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- IOCs collected during day-to-day activities☆120Updated this week
- GitHub action to run Threagile, the agile threat modeling toolkit, on a repo's threagile.yaml file☆14May 3, 2024Updated last year
- Cradlepoint ECM Command Line Interface☆11Mar 7, 2023Updated 3 years ago
- CERTITUDE - A python package to classify malicious URLs☆20May 16, 2022Updated 3 years ago
- Phishing can't get any easier with Tilapia☆11Jan 2, 2023Updated 3 years ago
- Extract machine readable cyber threat intelligence from unstructured data (inc. PDFs, Word docs, and HTML pages)☆38Updated this week
- Cleanup of older MISP events can require some work until now☆28Apr 5, 2026Updated 2 weeks ago
- A curated list of awesome threat detection and hunting resources☆10Mar 23, 2018Updated 8 years ago
- The CAPTCHA-resilient contact scraper.☆50Nov 18, 2025Updated 5 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆16May 15, 2025Updated 11 months ago
- Open KLara Project☆35Feb 12, 2026Updated 2 months ago
- ☆66Jan 8, 2026Updated 3 months ago
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆46Feb 13, 2026Updated 2 months ago
- A minimal CLI client for CRXcavator.io☆15Dec 8, 2022Updated 3 years ago
- SSL script used for on demand certificate generation and validation.☆14May 17, 2020Updated 5 years ago
- Awesome List of Enterprise Security Tools' Community Edition☆16Nov 10, 2023Updated 2 years ago