sapphirex00 / Threat-HuntingView external linksLinks
Personal compilation of APT malware from whitepaper releases, documents and own research
☆266Feb 7, 2019Updated 7 years ago
Alternatives and similar repositories for Threat-Hunting
Users that are interested in Threat-Hunting are comparing it to the libraries listed below
Sorting:
- FCL (Fileless Command Lines) - Known command lines of fileless malicious executions☆477Apr 8, 2021Updated 4 years ago
- Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups☆724Dec 26, 2022Updated 3 years ago
- Python tool and library to help analyze files during malware triage and analysis.☆78Jul 2, 2020Updated 5 years ago
- Repository with Sample threat hunting notebooks on Security Event Log Data Sources☆69Dec 2, 2022Updated 3 years ago
- A collection of resources for Threat Hunters☆914Oct 15, 2024Updated last year
- This repo is where I store my Threat Hunting ideas/content☆88May 9, 2023Updated 2 years ago
- Windows Events Attack Samples☆2,507Jan 24, 2023Updated 3 years ago
- Interesting APT Report Collection And Some Special IOCs☆2,889Updated this week
- Powershell collection designed to assist in Threat Hunting Windows systems.☆27Apr 13, 2018Updated 7 years ago
- A curated list of the most important and useful resources about Threat Detection,Hunting and Intelligence.☆575Mar 24, 2023Updated 2 years ago
- Indicators of compromise (IOCs) collected from public resources and categorized by Qi-AnXin.☆959Aug 28, 2025Updated 5 months ago
- Steal users password with a fake sudo function.☆43Feb 29, 2024Updated last year
- Threat-Intelligence Feeds & Tools & Frameworks☆223Jun 7, 2024Updated last year
- APT & CyberCriminal Campaign Collection☆4,043Jul 25, 2024Updated last year
- A toolkit for Security Researchers☆127Sep 2, 2019Updated 6 years ago
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆87Jun 4, 2022Updated 3 years ago
- Repository of YARA rules made by Trellix ATR Team☆623Mar 18, 2025Updated 10 months ago
- Tools to rapidly deploy a threat hunting capability on Azure Sentinel that leverages Sysmon and MITRE ATT&CK☆1,077Nov 28, 2024Updated last year
- PCAP Samples for Different Post Exploitation Techniques☆368Apr 29, 2021Updated 4 years ago
- A collection of malware samples and relevant dissection information, most probably referenced from http://blog.inquest.net☆930Mar 26, 2024Updated last year
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,475Jan 12, 2026Updated last month
- Misc Threat Hunting Resources☆377Jan 26, 2023Updated 3 years ago
- Pull some Malware samples here for other security researchers/malware analyst's to analyze and play with.☆174May 29, 2024Updated last year
- Tools for hunting for threats.☆599Apr 30, 2025Updated 9 months ago
- All-in-one bundle of MISP, TheHive and Cortex☆169Sep 27, 2022Updated 3 years ago
- DFIRTrack - The Incident Response Tracking Application☆532Jan 13, 2026Updated last month
- Extract and aggregate threat intelligence.☆902Jan 31, 2024Updated 2 years ago
- Detect Tactics, Techniques & Combat Threats☆2,262Jan 21, 2026Updated 3 weeks ago
- Your Everyday Threat Intelligence☆1,949Updated this week
- In this training will be covered about a very basic step for malware analysis. Using several free tools to recognize malware behavior. Si…☆12May 25, 2016Updated 9 years ago
- buffer overflow examples☆23Dec 20, 2017Updated 8 years ago
- Telsy CTI Research Team☆57Dec 15, 2020Updated 5 years ago
- Collection of Jupyter Notebook for Threat Hunting and Blue Team Purposes☆22Jun 15, 2022Updated 3 years ago
- Malcom - Malware Communications Analyzer☆1,165Nov 29, 2017Updated 8 years ago
- Utilities for Sysmon☆1,571Sep 21, 2025Updated 4 months ago
- Signature engine for all your logs☆173Nov 13, 2023Updated 2 years ago
- Re-play Security Events☆1,723Mar 20, 2024Updated last year
- A collection of YARA rules we wish to share with the world, most probably referenced from http://blog.inquest.net.☆388May 11, 2022Updated 3 years ago
- This repo is dedicated to all my tricks, tweaks and modules for testing and hunting threats. This repo contains multiple directories whic…☆57Jan 10, 2018Updated 8 years ago