This repository hosts community contributed Kestrel huntflows (.hf) and huntbooks (.ipynb)
☆37Jan 2, 2024Updated 2 years ago
Alternatives and similar repositories for kestrel-huntbook
Users that are interested in kestrel-huntbook are comparing it to the libraries listed below
Sorting:
- This repository hosts community contributed Kestrel analytics☆18May 28, 2024Updated last year
- Kestrel threat hunting language: building reusable, composable, and shareable huntflows across different data sources and threat intel.☆324Sep 27, 2024Updated last year
- Kestrel Jupyter Notebook Kernel☆10Oct 19, 2023Updated 2 years ago
- Firepit - STIX Columnar Storage☆18Jun 5, 2024Updated last year
- ☆19Oct 23, 2020Updated 5 years ago
- Sample SecOps scripts and Utilities☆12Jun 19, 2024Updated last year
- This project consists of an open source library allowing software to connect to data repositories using STIX Patterning, and return resul…☆261Feb 27, 2026Updated last week
- Posture Attribute Collection and Evaluation☆23Jun 20, 2023Updated 2 years ago
- ☆12Feb 9, 2025Updated last year
- Hunting Malicious Macros SANS Threathunting Summit 2021 Materials☆39Oct 9, 2021Updated 4 years ago
- A simple way of detecting multithreaded exfiltration in Zeek.☆15May 1, 2025Updated 10 months ago
- A Zeek package that detects Zoom logins and meeting joins☆12Apr 15, 2020Updated 5 years ago
- Repository to provide files related to our blog articles.☆16May 26, 2025Updated 9 months ago
- Cyber Threats Detection Rules☆14Sep 16, 2025Updated 5 months ago
- OpenDXL Broker is an open source version of a Data Exchange Layer (DXL) broker☆14Feb 11, 2024Updated 2 years ago
- Incremental Machine Leaning by example - Detecting suspicious activity in real time with Zeek data streams, River and JA3 hashes☆16Aug 10, 2022Updated 3 years ago
- ☆18Jun 8, 2018Updated 7 years ago
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Apr 10, 2020Updated 5 years ago
- Collection of Jupyter Notebook for Threat Hunting and Blue Team Purposes☆22Jun 15, 2022Updated 3 years ago
- (kinda) Malicious Outlook Reader☆19Mar 2, 2021Updated 5 years ago
- Detection Engineering with YARA☆87Jan 6, 2024Updated 2 years ago
- Collection of YARA signatures from individual research☆44Nov 20, 2023Updated 2 years ago
- PyCommand Scripts for Immunity Debugger☆37Jun 21, 2014Updated 11 years ago
- Use SQL to instantly query file, domain, URL and IP scanning results from VirusTotal.☆23Oct 13, 2025Updated 4 months ago
- ☆19Oct 30, 2020Updated 5 years ago
- Decentralized Cyber Threat Intelligence Kaizen Framework☆27Jan 31, 2022Updated 4 years ago
- Information relating to the governance of the Open Cybersecurity Alliance (OCA) OASIS Open Project. https://github.com/opencybersecuritya…☆29Feb 23, 2026Updated last week
- JSON DataSet for macOS mapped to MITRE ATT&CK Tactics.☆158Sep 10, 2021Updated 4 years ago
- ☆24Mar 19, 2020Updated 5 years ago
- Automatic detection engineering technical state compliance☆55Jul 7, 2024Updated last year
- YAFRA is a semi-automated framework for analyzing and representing reports about IT Security incidents.☆27Dec 14, 2021Updated 4 years ago
- A list of RMMs designed to be used in automation to build alerts☆117Nov 9, 2025Updated 3 months ago
- This repository contains all public indicators identified by 401trg during the course of our investigations. It also includes relevant ya…☆120Apr 14, 2021Updated 4 years ago
- Awesome Splunk SPL hunt queries that can be used to detect the latest vulnerability exploitation attempts & subsequent compromise☆68Apr 29, 2024Updated last year
- OCA-wide documentation shared by all sub-projects and repositories☆33Oct 31, 2024Updated last year
- Intelligence around common attacker behaviors (MITRE ATT&CK TTPs), in the form of ATT&CK Navigator "layer" json files.☆36Aug 12, 2022Updated 3 years ago
- Repository for threat hunting and detection queries, etc. for Defender for Endpoint and Microsoft Sentinel in KQL(Kusto Query Language).☆803Jan 14, 2026Updated last month
- ☆27Jul 11, 2022Updated 3 years ago
- Create dataset for suricata with indicators of MISP instances and add sightings in MISP if an indicator of dataset generates an alert☆37Nov 9, 2022Updated 3 years ago