A project designed to make the operationalization of open-source cyber threat intelligence more efficient.
☆18May 4, 2026Updated this week
Alternatives and similar repositories for hunting-packages
Users that are interested in hunting-packages are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This repository contains various threat hunting tools written in Python and is documented in the series Python Threat Hunting Tools which…☆19Nov 16, 2023Updated 2 years ago
- introduction to distributed scanning using vultr☆11Apr 29, 2017Updated 9 years ago
- Jupyter Notebooks for Digital Forensics & Incident Response☆10Nov 23, 2021Updated 4 years ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Aug 4, 2021Updated 4 years ago
- A quick reference guide for python script development in DFIR☆18Mar 20, 2024Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Common Malware Techniques☆13Mar 26, 2023Updated 3 years ago
- This repo is all about Blue teamming and CyberDefenders Write-up for their DFIR challenges☆19Nov 5, 2023Updated 2 years ago
- My Notes from Hugging Face AI Agents Course☆19Feb 18, 2025Updated last year
- Threat Hunting is time consuming enough as it is. Coming up with and tracking metrics to justify your hunt team to the Execs often takes…☆13Dec 7, 2022Updated 3 years ago
- Convert your spreadsheet or CSV for the GIAC exam to a more compact index. Inspired by Voltaire and usable offline.☆21Jun 6, 2025Updated 11 months ago
- My Gitbook CyberSec Notes☆21Oct 22, 2025Updated 6 months ago
- This repository is a comprehensive collection of resources, documentation, apps, and add-ons related to Splunk, a powerful data analytics…☆26May 3, 2026Updated last week
- A community-driven repository for threat hunting ideas, methodologies, and research that serves as a central gathering place for hunters …☆315Updated this week
- API to access the Redis database of a BGP Ranking instance.☆17Dec 11, 2017Updated 8 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆33Jan 1, 2020Updated 6 years ago
- Tracking and documenting monthly insights about hacktivist coalitions.☆23Sep 14, 2025Updated 7 months ago
- A detailed list of potentially dangerous file extensions☆18Jun 18, 2025Updated 10 months ago
- Welcome to the Cloud Security Toolkit repository, your all-in-one destination for cutting-edge cloud security resources! Whether you're d…☆49Mar 8, 2026Updated 2 months ago
- a simple powershell wrapper to automate checking a user's access around the network☆13Dec 5, 2023Updated 2 years ago
- ☆15Jun 5, 2024Updated last year
- GitHub action to run Threagile, the agile threat modeling toolkit, on a repo's threagile.yaml file☆14May 3, 2024Updated 2 years ago
- IOCs collected during day-to-day activities☆128May 1, 2026Updated last week
- Cradlepoint ECM Command Line Interface☆11Mar 7, 2023Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Mem2Img: Memory-Resident Malware Detection via Convolution Neural Network☆25May 6, 2021Updated 5 years ago
- CERTITUDE - A python package to classify malicious URLs☆20May 16, 2022Updated 3 years ago
- Phishing can't get any easier with Tilapia☆11Jan 2, 2023Updated 3 years ago
- Extract machine readable cyber threat intelligence from unstructured data (inc. PDFs, Word docs, and HTML pages)☆38Apr 22, 2026Updated 2 weeks ago
- Process Dumper written entirely in VBA.☆25Feb 13, 2021Updated 5 years ago
- Cleanup of older MISP events can require some work until now☆28Apr 5, 2026Updated last month
- A curated list of awesome threat detection and hunting resources☆10Mar 23, 2018Updated 8 years ago
- ☆16May 15, 2025Updated 11 months ago
- Open KLara Project☆36Feb 12, 2026Updated 2 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆48Apr 28, 2026Updated last week
- A minimal CLI client for CRXcavator.io☆15Dec 8, 2022Updated 3 years ago
- Awesome List of Enterprise Security Tools' Community Edition☆16Nov 10, 2023Updated 2 years ago
- Reaque is an mobile tool where we can share and find things related to Mozambique, the people and things there. From reflections and cult…☆13Sep 10, 2019Updated 6 years ago
- My dot files and other profile settings☆18Apr 14, 2026Updated 3 weeks ago
- A handy plugin for copying requests/responses directly from Burp, some extra magic included.☆13Oct 15, 2021Updated 4 years ago
- LockBit-Black-Builder_ ;this is Lockbit Black Builder☆10Sep 28, 2022Updated 3 years ago