Use DNS to hunt for threats including DGAs
☆15Jan 4, 2016Updated 10 years ago
Alternatives and similar repositories for DNS-Hunting
Users that are interested in DNS-Hunting are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- My Year of Python Repository☆28Jun 13, 2020Updated 5 years ago
- Lootbox downloads open directories shared on Twitter.☆35Mar 28, 2021Updated 4 years ago
- An informational repo about hunting for adversaries in your IT environment.☆14Apr 10, 2017Updated 8 years ago
- Simple Live Data Collection Tool☆22Oct 4, 2020Updated 5 years ago
- Reference sheet for Threat Hunting Professional Course☆26Mar 10, 2019Updated 7 years ago
- Mimikatz HashClash☆12May 8, 2015Updated 10 years ago
- Python and PowerShell utilities for finding installed browser extensions, plug-ins and add-ons☆25Jun 14, 2016Updated 9 years ago
- Repo of python/bash scripts for identifying IoC's in threat feed and other online tools☆26Jul 27, 2020Updated 5 years ago
- Create alerts in The Hive from your Graylog alerts, to be turned into Hive cases.☆45Aug 17, 2020Updated 5 years ago
- My personal experience in Threat Hunting and knowledge gained so far.☆19May 27, 2017Updated 8 years ago
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Feb 6, 2024Updated 2 years ago
- ☆34Apr 29, 2021Updated 4 years ago
- Snort Rules☆19Mar 9, 2016Updated 10 years ago
- macos-collector - Automated Collection of macOS Forensic Artifacts for DFIR☆37Mar 16, 2026Updated last week
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆31Mar 15, 2022Updated 4 years ago
- Ansible playbook for installing MineMeld on Linux☆47Mar 18, 2021Updated 5 years ago
- Veil 3.1.X (Check version info in Veil at runtime)☆16Aug 14, 2019Updated 6 years ago
- Quick & Dirty DFIR scripts developed by Ebryx DFIR team to keep handy during field assignment☆14Jan 7, 2026Updated 2 months ago
- Library of python scripts to apply Data Science in several forensics artifacts☆31Jul 16, 2020Updated 5 years ago
- ☆12Dec 10, 2020Updated 5 years ago
- Resources for SANS CTI Summit 2021 presentation☆104Nov 8, 2023Updated 2 years ago
- ☆92Dec 8, 2022Updated 3 years ago
- Cyber Threat Intelligence - Toolbox☆52Oct 8, 2018Updated 7 years ago
- Comfy & powerful Red Team Infrastructure deployement using Docker☆13Oct 29, 2019Updated 6 years ago
- Content for cyber defense course☆14Oct 15, 2014Updated 11 years ago
- Term concordances for each course in the SANS DFIR curriculum. Used for automated index generation.☆69Aug 7, 2020Updated 5 years ago
- An enchanting 🔮 web screenshot tool for capturing and sharing web content effortlessly☆34Nov 15, 2025Updated 4 months ago
- Code, commands, and chatter about Threat Hunting.☆35Jan 5, 2020Updated 6 years ago
- ☆50Aug 30, 2020Updated 5 years ago
- Yet another dirbuster tool☆13Oct 16, 2023Updated 2 years ago
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆12Oct 23, 2016Updated 9 years ago
- Evolution of Discrete data with Reinforcement Learning☆13Dec 8, 2019Updated 6 years ago
- Get notified instantly when your users of interest speak about something.☆10Mar 24, 2020Updated 6 years ago
- Maltego Local Transforms for truepeoplesearch.com☆12Jun 5, 2017Updated 8 years ago
- To parse ugly Microsoft DNS Logs....☆41Jun 8, 2018Updated 7 years ago
- certstream + analytics☆11Jan 17, 2020Updated 6 years ago
- PowerShell Pass The Hash Utils☆16Dec 9, 2018Updated 7 years ago
- Easy discovery of assets☆13Jun 22, 2022Updated 3 years ago
- A triage data collection script for macOS☆29Nov 27, 2020Updated 5 years ago