Splunk app for Threat hunting
☆15Nov 15, 2018Updated 7 years ago
Alternatives and similar repositories for SA-Threat-Hunting
Users that are interested in SA-Threat-Hunting are comparing it to the libraries listed below
Sorting:
- Python script to run battery of Volatility plugins against a forensic memory image☆10Jun 22, 2019Updated 6 years ago
- Splunk Searches and Dashboards for DNS Threat Hunting☆10Mar 5, 2018Updated 8 years ago
- Splunk Technology Add-On (TA) for collecting ETW events from Windows systems☆17Dec 8, 2022Updated 3 years ago
- An automated firmware analysis tool based on Firmadyne (https://github.com/firmadyne/firmadyne)☆24Jul 8, 2017Updated 8 years ago
- A WDAC configuration repository with the sole intention of enriching MDE☆30Jun 18, 2025Updated 8 months ago
- Splunk code (SPL) for serious threat hunters and detection engineers.☆290Jan 15, 2024Updated 2 years ago
- attempt to perma root the NEC Terrain android phone☆10Jul 24, 2015Updated 10 years ago
- Ruins & Riches Ultima Online Server Files☆10Oct 15, 2023Updated 2 years ago
- Deploy and maintain Symon through the Splunk Deployment Sever☆32Jul 30, 2020Updated 5 years ago
- CB API scripts for IR, administration, etc.☆32Jun 3, 2019Updated 6 years ago
- Splunk App to assist Sysmon Threat Hunting☆38Mar 7, 2017Updated 9 years ago
- ☆10Oct 22, 2017Updated 8 years ago
- The Office 365 data Splunk app enables data analysts and IT administrators to import the data they need to get their organization more pr…☆16Jun 14, 2023Updated 2 years ago
- Create a new Windows VM on a standalone ESX host☆12Jan 1, 2021Updated 5 years ago
- Journey to conquer the OSCP!☆13Apr 18, 2019Updated 6 years ago
- Sample queries for Advanced hunting in Windows Defender ATP☆11Apr 22, 2020Updated 5 years ago
- Examples of various Ansible Playbooks for Microsoft Windows Server 2016☆10Mar 3, 2019Updated 7 years ago
- A Sega Master System and Game Gear Emulator for the Nintendo 64☆13Dec 5, 2025Updated 3 months ago
- Examples for the CyCLI Powershell module☆12Mar 8, 2019Updated 7 years ago
- ☆11Oct 11, 2020Updated 5 years ago
- Lazy SPL to detect Spring4Shell exploitation☆12Jul 8, 2022Updated 3 years ago
- Powershell module to help with all file server tasks without using WMI☆13Feb 25, 2026Updated last week
- Detection rules and threat hunting queries in Defender XDR and Azure Sentinel☆16Feb 11, 2026Updated 3 weeks ago
- Evil maid attacks are the biggest threat to full disk encryption, if you can't provide 100% physical security. It's not about locking you…☆11Sep 4, 2016Updated 9 years ago
- Mass malicious script dump/Malware src dump☆16Nov 25, 2016Updated 9 years ago
- TheRomanXpl0it is an italian academic CTF team from Sapienza, University of Rome.☆12Jan 30, 2026Updated last month
- Steam scripts for Outlands shard☆10Feb 15, 2020Updated 6 years ago
- Security Onion Splunk App☆10May 18, 2015Updated 10 years ago
- MMORPG server emulator☆12Aug 26, 2018Updated 7 years ago
- My Linux profiles built for Volatility 2/3☆10Oct 11, 2025Updated 4 months ago
- LLM supported Toolkit for Blue Team/ SOC Operations☆47Jan 10, 2026Updated 2 months ago
- CyberArk Identity API PowerShell Module☆11Apr 15, 2025Updated 10 months ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 6 years ago
- Hacking the HooToo HT-TM05☆13Dec 22, 2022Updated 3 years ago
- Jupyter Notebooks for Digital Forensics & Incident Response☆10Nov 23, 2021Updated 4 years ago
- Build your own threat hunting maturity model☆11Oct 29, 2017Updated 8 years ago
- GUI for regripper☆11Mar 19, 2019Updated 6 years ago
- Writeups for Google CTF challenges 2017☆10Jun 19, 2017Updated 8 years ago
- 🐧 Security-focused Linux distribution with 140+ tools, custom kernel 6.17.13, AI assistant | 5 editions | Cloud, AI/ML, Automotive, Hard…☆31Updated this week