Forensics scripts aimed at automating & enhancing the Forensics Legend Eric Zimmerman's techniques, integrating the statistical detections of the world's greatest hacker Mark Baggett whose zero day still works a decade later, and eventually evolving the Threat Hunting Legend Florian Roth's Sigma scanning aimed towards the top of the pyramid of p…
☆18Sep 7, 2023Updated 2 years ago
Alternatives and similar repositories for Threat-Hunter
Users that are interested in Threat-Hunter are comparing it to the libraries listed below
Sorting:
- Fork this repo! Do a Pull Request! As many times as you want! Learn the ins and outs of how to contribute to GitHub! Make your mistakes h…☆14Jun 21, 2024Updated last year
- Splunk TA for alert action to TheHive-project☆11May 13, 2020Updated 5 years ago
- Converts Sigma detection rules to a Splunk alert configuration.☆12Jul 1, 2021Updated 4 years ago
- Capture. Detonate. Collect☆14Sep 20, 2024Updated last year
- The Eventlog Compendium is the go-to resource for understanding Windows Event Logs.☆52Apr 22, 2025Updated 10 months ago
- Git for me to put all my forensics stuff☆23Sep 2, 2025Updated 6 months ago
- A collection of dashboards, templates, API's and Power BI code for vulnerability management and analysis☆24Feb 2, 2025Updated last year
- Papers and Presentations from the DFRWS Conferences☆20Jul 12, 2022Updated 3 years ago
- A hex viewer for the sleuths!☆20Nov 7, 2025Updated 4 months ago
- geolocate ip addresses in IIS logs☆20Jan 8, 2025Updated last year
- ☆34Jun 13, 2023Updated 2 years ago
- Python script to walk a folder or a zip file for SQLite Databases☆37Sep 20, 2023Updated 2 years ago
- Automatic/Custom Destinations & LNK (MS-SHLLINK) Browser☆44Mar 1, 2026Updated last week
- Notes on managing and coordinating the response to major cyber incidents☆41May 30, 2020Updated 5 years ago
- ☆43Oct 11, 2023Updated 2 years ago
- In this article i've listed a collection of cheatsheets for digital forensics. It covering forensics topics for smartphone , memory , net…☆13Mar 8, 2020Updated 6 years ago
- The Sentinel.blog Repository provides automation tools for updating Analytics Rules, Content Hub Solutions, and Workbooks, eliminating re…☆17Updated this week
- ☆22Nov 22, 2025Updated 3 months ago
- My home server infrastructure as code☆16Updated this week
- ☆93Jul 30, 2025Updated 7 months ago
- A Windows registry file parser written in Rust☆41Oct 30, 2025Updated 4 months ago
- A Jupyter notebook to assist with the analysis of the output generated from Volatility memory extraction framework.☆97May 28, 2023Updated 2 years ago
- Parses USB connection artifacts from offline Registry hives☆107Feb 8, 2026Updated last month
- How can you track the hunting techniques you come up with?☆13Sep 3, 2017Updated 8 years ago
- Osquery Packs we use for customer security hardening☆12Jun 30, 2025Updated 8 months ago
- ☆11Jun 5, 2022Updated 3 years ago
- FileSigExtractor is a python based tool which extracts the file signatures of all files within a directory and writes the output to a CSV…☆10Jul 15, 2023Updated 2 years ago
- CERT Australia Cyber Threat Intelligence (CTI) Toolkit☆15Nov 11, 2017Updated 8 years ago
- ☆45Apr 10, 2024Updated last year
- go client for the wazuh rest api☆12Nov 1, 2025Updated 4 months ago
- Telegram Bot that performs checks of the yararules.com ruleset☆13May 13, 2016Updated 9 years ago
- A simple python script to generate nested folders based on user input. The script will also name and place a template report document and…☆11Jun 19, 2025Updated 8 months ago
- A Postfix filter which takes a piped message and submits it to Cuckoo Sandbox☆11Apr 3, 2016Updated 9 years ago
- A password list optimized for use on Android devices.☆11Jul 2, 2022Updated 3 years ago
- A local-first, encrypted end-of-life planning and information management application. Life Binder helps you organize critical information…☆42Jan 26, 2026Updated last month
- PowerShell scripts to aid investigators when utilizing O365 and Magnet Axiom.☆12Aug 26, 2024Updated last year
- Three datasets to practice Threat Hunting against.☆46Jan 3, 2024Updated 2 years ago
- An open-source computer forensics tool that can display summary as the result of Windows Event Log analysis based on the chosen function(…☆11Feb 2, 2023Updated 3 years ago
- 🌦️ Domain Ranker☆16Sep 7, 2019Updated 6 years ago