This repo is dedicated to all my tricks, tweaks and modules for testing and hunting threats. This repo contains multiple directories which are in their own, different modules required for threat hunting. This repo will be updated as and when new changes are made.
☆57Jan 10, 2018Updated 8 years ago
Alternatives and similar repositories for Threat-Hunting
Users that are interested in Threat-Hunting are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This is a Shell Script to setup NTLM hash sniffing using the Raspberry Pi Zero. This tool can be used during Red Team assessments by atta…☆23Jun 7, 2017Updated 8 years ago
- This Shell script can create a chrooted environment along with a SSH Jail for the same. This can be used either for a single user jail or…☆19Jun 8, 2017Updated 8 years ago
- This repo contains my custom scripts for Penetration Testing and Red Team Assessments. I will keep on updating this repo as and when I ge…☆359Nov 14, 2018Updated 7 years ago
- My personal experience in Threat Hunting and knowledge gained so far.☆19May 27, 2017Updated 8 years ago
- Repo contains a list of random scripts that I use while testing out random things.☆48Apr 3, 2019Updated 7 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Evil snippets of Underhanded Red Team tactics☆11Jul 5, 2017Updated 8 years ago
- Offensive Android Kernel on Steroids - Shuriken is an Android kernel for Oneplus 5/5T which supports multiple features for pentesting.☆28Dec 25, 2018Updated 7 years ago
- Plaform independent reverse shell over https☆11Mar 2, 2020Updated 6 years ago
- Code, commands, and chatter about Threat Hunting.☆35Jan 5, 2020Updated 6 years ago
- This directory contains random scripts from threat hunting or malware research☆11Feb 15, 2018Updated 8 years ago
- Intelligent threat hunter and phishing servers☆47Jan 20, 2019Updated 7 years ago
- Powershell Threat Hunting Module☆291Sep 21, 2016Updated 9 years ago
- Useful Powershell Tools for operating or testing Infocyte HUNT☆19Jan 10, 2025Updated last year
- Application Security Vulnerability Periodic Table☆14Aug 25, 2014Updated 11 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Powershell collection designed to assist in Threat Hunting Windows systems.☆27Apr 13, 2018Updated 8 years ago
- Boomerang is a tool to expose multiple internal servers to web/cloud. Agent & Server are pretty stable and can be used in Red Team for Mu…☆225Feb 9, 2021Updated 5 years ago
- ☆13May 17, 2016Updated 9 years ago
- A Metasploit module which allows authenticated database users to perform command execution of PostgreSQL 9.3 > Latest Version☆16May 8, 2019Updated 7 years ago
- A script for quickly gathering GeoIP data on a single or multiple IP Addresses☆16Aug 31, 2015Updated 10 years ago
- A Tool for cross-platform System Enumeration☆12Mar 20, 2017Updated 9 years ago
- Some YARA rules i will add from time to time☆12May 31, 2019Updated 6 years ago
- Modular command-line threat hunting tool & framework.☆17Jul 20, 2020Updated 5 years ago
- Enter Product Key Volatile Environment LPE☆13Jun 28, 2025Updated 10 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Personal blog about security, exploitation, CTFs, ...☆21Feb 20, 2019Updated 7 years ago
- Information about most important hunts which can be performed by Threat hunters while searching for any adversary/threats inside the orga…☆15May 18, 2019Updated 6 years ago
- Repo to hold the markdown-ified metadata on AppSec tools that are automation-friendly☆12Jun 13, 2016Updated 9 years ago
- PowerShell script utilized to pull several forensic artifacts from a live Win7 and WinXP system without WINRM.☆52Jan 25, 2018Updated 8 years ago
- NimSkrull is an adaption from the original Skrull malware anti-copy DRM. Only for the anti-copy feature. (https://github.com/aaaddress1/S…☆13May 20, 2023Updated 2 years ago
- Artefacts from various retefe campaigns☆10Mar 9, 2019Updated 7 years ago
- Personal compilation of APT malware from whitepaper releases, documents and own research☆266Feb 7, 2019Updated 7 years ago
- A utility to force query DNS over DoH off of CloudFlare API when DNS block is in place☆10Aug 26, 2018Updated 7 years ago
- ☆122Mar 6, 2018Updated 8 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Repo of python/bash scripts for identifying IoC's in threat feed and other online tools☆27Jul 27, 2020Updated 5 years ago
- intrusion detection☆26Jun 14, 2017Updated 8 years ago
- Penetration Testing/Security Cheatsheets☆65Oct 31, 2015Updated 10 years ago
- Threat Hunting with ELK Workshop (InfoSecWorld 2017)☆65Oct 31, 2017Updated 8 years ago
- Python tool and library to help analyze files during malware triage and analysis.☆78Jul 2, 2020Updated 5 years ago
- Searches For Threat Hunting and Security Analytics☆239Mar 26, 2025Updated last year
- Copy of Subtee's Repository That's Taken Down☆22Nov 2, 2017Updated 8 years ago