paranoidninja / Threat-HuntingLinks
This repo is dedicated to all my tricks, tweaks and modules for testing and hunting threats. This repo contains multiple directories which are in their own, different modules required for threat hunting. This repo will be updated as and when new changes are made.
☆57Updated 7 years ago
Alternatives and similar repositories for Threat-Hunting
Users that are interested in Threat-Hunting are comparing it to the libraries listed below
Sorting:
- PortPlow is a distributed port and system scanning & enumeration service. It enables the quick and automated enumeration of ports and ser…☆55Updated last year
- PurpleSpray is an adversary simulation tool that executes password spray behavior under different scenarios and conditions with the purpo…☆51Updated 6 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 7 years ago
- DeployREMnux is a Python script that will deploy a cloud instance of the public REMnux distribution in the Amazon cloud (AWS).☆16Updated 5 years ago
- OSSEM Modular☆27Updated 5 years ago
- Slack/Microsoft Teams notification for new Empire/Meterpreter checkins☆25Updated last year
- ☆81Updated 6 years ago
- ☆76Updated 7 years ago
- AvBuster The stress Tester for your Anti Malware solutions☆41Updated 4 years ago
- PowerShellUtilities provides various utility commandlets.☆51Updated 5 years ago
- PSAttck is a light-weight framework for the MITRE ATT&CK Framework.☆38Updated 3 years ago
- Web Filter External Enumeration Tool (WebFEET)☆77Updated 11 years ago
- A collection of scripts I've written to help red and blue teams with malware persistence techniques.☆127Updated 7 years ago
- Linux setup tool for Kali Linux☆80Updated 7 years ago
- ☆78Updated 8 years ago
- mindmap created for tools can be used during analysis/investigation☆27Updated 8 years ago
- SilkETW & SilkService☆40Updated 6 years ago
- Python parser for Red Canary's Atomic Red Team Yamls☆27Updated 6 years ago
- Open Source - Common Findings DataBase (JSON & MD)☆67Updated 3 years ago
- Notebooks created to attack and secure Active Directory environments☆28Updated 6 years ago
- Executes common PowerSploit Powerview functions then combines output into a spreadsheet for easy analysis.☆69Updated 7 years ago
- ☆36Updated 5 years ago
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆38Updated 2 years ago
- This module mangles two lists of names together to generate a list of potential email addresses or usernames. It can also be used to simp…☆50Updated 8 years ago
- PowerShell Memory Pulling script☆19Updated 10 years ago
- Updated version of C2K☆51Updated 7 years ago
- LogRM is a post exploitation powershell script which it uses windows event logs to gather information about internal network☆74Updated 6 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 4 years ago
- Script to automate, manage, and multithread Nikto scans.☆63Updated 5 years ago
- ☆98Updated 6 years ago