☆38Aug 23, 2022Updated 3 years ago
Alternatives and similar repositories for Threat-Hunting-in-AWS
Users that are interested in Threat-Hunting-in-AWS are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Threat Hunt Investigation Methodology and Procedure☆15Jul 11, 2022Updated 3 years ago
- Short deep dive into Threat Hunting on AWS☆19Oct 15, 2023Updated 2 years ago
- Library of threat hunts to get any user started!☆50Sep 4, 2020Updated 5 years ago
- Some scripts useful for red team activities☆13Jan 18, 2020Updated 6 years ago
- Validates username & password combination(s) across a host or group of hosts using the SMB protocol.☆15Apr 6, 2020Updated 6 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆11May 3, 2026Updated last week
- Assist analyst and threat hunters to understand Windows authentication logs and to analyze brutforce scenarios.☆21Jul 1, 2023Updated 2 years ago
- ☆72Oct 21, 2024Updated last year
- Cheat sheets for threat hunting, detection and other stuff.☆34Oct 7, 2022Updated 3 years ago
- Threat Hunting with ELK Workshop (InfoSecWorld 2017)☆65Oct 31, 2017Updated 8 years ago
- Useful scripts, rules etc. for use with YARA☆27Feb 12, 2021Updated 5 years ago
- Provides an overview of the inner file structure of a PDF☆24Sep 26, 2022Updated 3 years ago
- A tool for fetching DFIR and other GitHub tools.☆27Aug 2, 2025Updated 9 months ago
- Small-scale threat emulation and detection range built on Elastic and Atomic Redteam.☆39Dec 17, 2025Updated 4 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Collect chrome extensions from various devices and find out if they are malicious☆25Mar 1, 2026Updated 2 months ago
- ☆57Apr 16, 2026Updated 3 weeks ago
- JPCERT/CC public YARA rules repository☆111Mar 9, 2026Updated 2 months ago
- Best practices for hardening your AWS account, most of them are free☆35Mar 31, 2026Updated last month
- Troubleshooting MDE Workstations☆43May 1, 2026Updated last week
- TurboFuzzLLM: Turbocharging Mutation-based Fuzzing for Effectively Jailbreaking Large Language Models in Practice☆24Nov 24, 2025Updated 5 months ago
- ☆12Jan 5, 2021Updated 5 years ago
- This repo is where I store my Threat Hunting ideas/content☆90Mar 20, 2026Updated last month
- ☆14Jun 1, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆15Sep 26, 2022Updated 3 years ago
- ☆12Mar 24, 2018Updated 8 years ago
- Tool for obtaining information about PPL processes☆16Feb 12, 2024Updated 2 years ago
- ☆10May 25, 2023Updated 2 years ago
- ☆43Jul 6, 2022Updated 3 years ago
- A repository dedicated to tracking ransomware families based on leaked builders.☆22Apr 17, 2024Updated 2 years ago
- This repository contains the research and components of our research into using Sigma for AWS Incident Response.☆31Jul 12, 2023Updated 2 years ago
- ☆10Jul 1, 2023Updated 2 years ago
- PowerHunt is a modular threat hunting framework written in PowerShell that leverages PowerShell Remoting for data collection on scale.☆71Dec 12, 2024Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Notes only☆21May 2, 2022Updated 4 years ago
- A tiny tool to learn the assembly code☆12Feb 17, 2017Updated 9 years ago
- Collection of Suricata rule sets that I use modified to my environments.☆39Sep 13, 2020Updated 5 years ago
- Interactsh deployment to AWS EC2 Instance with Terraform☆12Dec 29, 2021Updated 4 years ago
- GCP CSPM using Google Sheets☆38Apr 4, 2025Updated last year
- Add a layer of active defense to your cloud applications.☆106Updated this week
- List of custom developed KQL queries to help proactive security teams hunt for opportunistic and sophisticated threat activity by develop…☆26Jun 30, 2021Updated 4 years ago