☆37Aug 23, 2022Updated 3 years ago
Alternatives and similar repositories for Threat-Hunting-in-AWS
Users that are interested in Threat-Hunting-in-AWS are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- LLM Supported Attack Scenario Creator from Code Review☆14Oct 22, 2024Updated last year
- Threat Hunt Investigation Methodology and Procedure☆15Jul 11, 2022Updated 3 years ago
- Short deep dive into Threat Hunting on AWS☆18Oct 15, 2023Updated 2 years ago
- DNS Dashboard for hunting and identifying beaconing☆16Jul 29, 2020Updated 5 years ago
- Library of threat hunts to get any user started!☆50Sep 4, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆11Dec 9, 2025Updated 3 months ago
- Assist analyst and threat hunters to understand Windows authentication logs and to analyze brutforce scenarios.☆21Jul 1, 2023Updated 2 years ago
- ☆72Oct 21, 2024Updated last year
- Cheat sheets for threat hunting, detection and other stuff.☆34Oct 7, 2022Updated 3 years ago
- Threat Hunting with ELK Workshop (InfoSecWorld 2017)☆65Oct 31, 2017Updated 8 years ago
- Useful scripts, rules etc. for use with YARA☆27Feb 12, 2021Updated 5 years ago
- Provides an overview of the inner file structure of a PDF☆24Sep 26, 2022Updated 3 years ago
- A tool for fetching DFIR and other GitHub tools.☆27Aug 2, 2025Updated 7 months ago
- Small-scale threat emulation and detection range built on Elastic and Atomic Redteam.☆39Dec 17, 2025Updated 3 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Collect chrome extensions from various devices and find out if they are malicious☆25Mar 1, 2026Updated 3 weeks ago
- JPCERT/CC public YARA rules repository☆109Mar 9, 2026Updated 3 weeks ago
- OpenDXL Console is a high-level web-based console for interacting with a DXL fabric☆11Mar 29, 2021Updated 5 years ago
- TurboFuzzLLM: Turbocharging Mutation-based Fuzzing for Effectively Jailbreaking Large Language Models in Practice☆23Nov 24, 2025Updated 4 months ago
- ☆12Jan 5, 2021Updated 5 years ago
- Basic NGINX module to report on OpenSSL FIPS status☆10Jun 10, 2022Updated 3 years ago
- This repo is where I store my Threat Hunting ideas/content☆89Mar 20, 2026Updated last week
- ☆14Jun 1, 2023Updated 2 years ago
- ☆12Mar 24, 2018Updated 8 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Tool for obtaining information about PPL processes☆16Feb 12, 2024Updated 2 years ago
- ☆10May 25, 2023Updated 2 years ago
- ☆43Jul 6, 2022Updated 3 years ago
- A repository dedicated to tracking ransomware families based on leaked builders.☆22Apr 17, 2024Updated last year
- This repository contains the research and components of our research into using Sigma for AWS Incident Response.☆31Jul 12, 2023Updated 2 years ago
- ☆10Jul 1, 2023Updated 2 years ago
- High performance time ordered PCAP merging utility☆23Jun 20, 2022Updated 3 years ago
- Notes only☆20May 2, 2022Updated 3 years ago
- GCP CSPM using Google Sheets☆38Apr 4, 2025Updated 11 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Add a layer of active defense to your cloud applications.☆105Mar 21, 2026Updated last week
- Bro analyzer that detects Google's QUIC protocol☆10Mar 2, 2021Updated 5 years ago
- ☆11Apr 17, 2017Updated 8 years ago
- A collection of searches, interesting events and tables on Crowdstrike Splunk.☆30Mar 2, 2021Updated 5 years ago
- Packer.io Scripts to build the SIFT VM(s)☆10Aug 29, 2020Updated 5 years ago
- BAADTokenBroker is a post-exploitation tool designed to interact with Microsoft Entra ID device-bound keys.☆63Mar 11, 2026Updated 2 weeks ago
- Personal notes and lab results pertaining to the text "Practical Malware Analysis" by Michael Sikorski and Andrew Honiq.☆12Oct 28, 2017Updated 8 years ago