paranoidninja / Threat-Hunting
This repo is dedicated to all my tricks, tweaks and modules for testing and hunting threats. This repo contains multiple directories which are in their own, different modules required for threat hunting. This repo will be updated as and when new changes are made.
☆56Updated 7 years ago
Alternatives and similar repositories for Threat-Hunting:
Users that are interested in Threat-Hunting are comparing it to the libraries listed below
- A powershell script that prints a lot of IP and connection info to the screen☆31Updated 8 years ago
- PortPlow is a distributed port and system scanning & enumeration service. It enables the quick and automated enumeration of ports and ser…☆53Updated 4 months ago
- SilkETW & SilkService☆40Updated 5 years ago
- ☆76Updated 6 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆14Updated 6 years ago
- OSSEM Modular☆27Updated 4 years ago
- Presentation Slides☆27Updated 5 years ago
- Web Filter External Enumeration Tool (WebFEET)☆75Updated 10 years ago
- Automating those tasks which can or should be automated☆61Updated 7 years ago
- Python parser for Red Canary's Atomic Red Team Yamls☆27Updated 6 years ago
- Useful Threat Hunting Stuff☆31Updated 4 years ago
- PowerShell Memory Pulling script☆19Updated 10 years ago
- AvBuster The stress Tester for your Anti Malware solutions☆42Updated 4 years ago
- A collection of random bits of information common to many individual penetration tests, red teams, and other assessments☆108Updated 4 months ago
- A collection of scripts that I've written while pentesting.☆31Updated 6 years ago
- PSAttck is a light-weight framework for the MITRE ATT&CK Framework.☆38Updated 3 years ago
- 504 VSAgent☆23Updated 7 years ago
- Personal blog about security, exploitation, CTFs, ...☆20Updated 6 years ago
- Collection of scripts and tools that I created to aid in my testing.☆14Updated 3 years ago
- Automated enumeration☆30Updated 3 years ago
- ☆31Updated 4 months ago
- PurpleSpray is an adversary simulation tool that executes password spray behavior under different scenarios and conditions with the purpo…☆51Updated 5 years ago
- ☆82Updated 5 years ago
- SMB Named Pipe shell☆64Updated 4 months ago
- Open Source - Common Findings DataBase (JSON & MD)☆66Updated 2 years ago
- Powershell collection designed to assist in Threat Hunting Windows systems.☆27Updated 6 years ago
- A companion tool for BloodHound offering Active Directory statistics and number crunching☆65Updated 6 years ago
- Create an incident response triage toolkit for use with Windows or Linux.☆17Updated 4 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆36Updated 6 years ago
- Comprehensive Pivoting Framework☆20Updated 8 years ago