This repo is dedicated to all my tricks, tweaks and modules for testing and hunting threats. This repo contains multiple directories which are in their own, different modules required for threat hunting. This repo will be updated as and when new changes are made.
☆57Jan 10, 2018Updated 8 years ago
Alternatives and similar repositories for Threat-Hunting
Users that are interested in Threat-Hunting are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This is a Shell Script to setup NTLM hash sniffing using the Raspberry Pi Zero. This tool can be used during Red Team assessments by atta…☆23Jun 7, 2017Updated 8 years ago
- This Shell script can create a chrooted environment along with a SSH Jail for the same. This can be used either for a single user jail or…☆19Jun 8, 2017Updated 8 years ago
- This repo contains my custom scripts for Penetration Testing and Red Team Assessments. I will keep on updating this repo as and when I ge…☆359Nov 14, 2018Updated 7 years ago
- My personal experience in Threat Hunting and knowledge gained so far.☆19May 27, 2017Updated 8 years ago
- Repo contains a list of random scripts that I use while testing out random things.☆48Apr 3, 2019Updated 7 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- buffer overflow examples☆23Dec 20, 2017Updated 8 years ago
- Evil snippets of Underhanded Red Team tactics☆11Jul 5, 2017Updated 8 years ago
- Offensive Android Kernel on Steroids - Shuriken is an Android kernel for Oneplus 5/5T which supports multiple features for pentesting.☆28Dec 25, 2018Updated 7 years ago
- Plaform independent reverse shell over https☆11Mar 2, 2020Updated 6 years ago
- Code, commands, and chatter about Threat Hunting.☆35Jan 5, 2020Updated 6 years ago
- This directory contains random scripts from threat hunting or malware research☆11Feb 15, 2018Updated 8 years ago
- Intelligent threat hunter and phishing servers☆47Jan 20, 2019Updated 7 years ago
- Powershell Threat Hunting Module☆290Sep 21, 2016Updated 9 years ago
- Useful Powershell Tools for operating or testing Infocyte HUNT☆19Jan 10, 2025Updated last year
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Application Security Vulnerability Periodic Table☆14Aug 25, 2014Updated 11 years ago
- Powershell collection designed to assist in Threat Hunting Windows systems.☆27Apr 13, 2018Updated 8 years ago
- A Metasploit module which allows authenticated database users to perform command execution of PostgreSQL 9.3 > Latest Version☆15May 8, 2019Updated 6 years ago
- A script for quickly gathering GeoIP data on a single or multiple IP Addresses☆16Aug 31, 2015Updated 10 years ago
- A Tool for cross-platform System Enumeration☆12Mar 20, 2017Updated 9 years ago
- Some YARA rules i will add from time to time☆12May 31, 2019Updated 6 years ago
- Modular command-line threat hunting tool & framework.☆17Jul 20, 2020Updated 5 years ago
- Enter Product Key Volatile Environment LPE☆13Jun 28, 2025Updated 9 months ago
- Information about most important hunts which can be performed by Threat hunters while searching for any adversary/threats inside the orga…☆15May 18, 2019Updated 6 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Repo to hold the markdown-ified metadata on AppSec tools that are automation-friendly☆12Jun 13, 2016Updated 9 years ago
- NimSkrull is an adaption from the original Skrull malware anti-copy DRM. Only for the anti-copy feature. (https://github.com/aaaddress1/S…☆13May 20, 2023Updated 2 years ago
- Artefacts from various retefe campaigns☆10Mar 9, 2019Updated 7 years ago
- Personal compilation of APT malware from whitepaper releases, documents and own research☆265Feb 7, 2019Updated 7 years ago
- A utility to force query DNS over DoH off of CloudFlare API when DNS block is in place☆10Aug 26, 2018Updated 7 years ago
- ☆122Mar 6, 2018Updated 8 years ago
- Repo of python/bash scripts for identifying IoC's in threat feed and other online tools☆26Jul 27, 2020Updated 5 years ago
- intrusion detection☆26Jun 14, 2017Updated 8 years ago
- Penetration Testing/Security Cheatsheets☆65Oct 31, 2015Updated 10 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Threat Hunting with ELK Workshop (InfoSecWorld 2017)☆65Oct 31, 2017Updated 8 years ago
- ☆11Oct 22, 2018Updated 7 years ago
- Python tool and library to help analyze files during malware triage and analysis.☆78Jul 2, 2020Updated 5 years ago
- Scripts related to offensiveosint.io☆23Jun 5, 2020Updated 5 years ago
- Searches For Threat Hunting and Security Analytics☆239Mar 26, 2025Updated last year
- Copy of Subtee's Repository That's Taken Down☆23Nov 2, 2017Updated 8 years ago
- Notes on Active Directory analysis and exploitation☆11Mar 7, 2019Updated 7 years ago