shr3ddersec / ThreatHuntingView external linksLinks
Reference sheet for Threat Hunting Professional Course
☆26Mar 10, 2019Updated 6 years ago
Alternatives and similar repositories for ThreatHunting
Users that are interested in ThreatHunting are comparing it to the libraries listed below
Sorting:
- ☆11May 30, 2021Updated 4 years ago
- The Fastest way to consume Threat Intel☆26Apr 30, 2022Updated 3 years ago
- Collection of walkthroughs on various threat hunting techniques☆76Aug 3, 2020Updated 5 years ago
- Powershell collection designed to assist in Threat Hunting Windows systems.☆27Apr 13, 2018Updated 7 years ago
- Maltego Local Transforms for truepeoplesearch.com☆12Jun 5, 2017Updated 8 years ago
- Use DNS to hunt for threats including DGAs☆15Jan 4, 2016Updated 10 years ago
- ☆18Jul 24, 2019Updated 6 years ago
- Simple web frontend to an elasticsearch database made for local files indexing☆19Oct 25, 2019Updated 6 years ago
- List of scripts used for malware analysis☆15Aug 10, 2015Updated 10 years ago
- An Installation Script for Bro IDS on Debian Based Systems☆20Jun 25, 2020Updated 5 years ago
- ☆29Aug 21, 2024Updated last year
- Post-exploitation tool☆26Mar 7, 2021Updated 4 years ago
- Linux Incident Response☆90Sep 22, 2019Updated 6 years ago
- ThreatHunt is a PowerShell repository that allows you to train your threat hunting skills.☆135Jul 25, 2019Updated 6 years ago
- ☆19Jun 16, 2021Updated 4 years ago
- Just a bunch of useful links to take (and pass!) OSCP☆19May 18, 2020Updated 5 years ago
- Repo of python/bash scripts for identifying IoC's in threat feed and other online tools☆26Jul 27, 2020Updated 5 years ago
- Simple DDE object detector☆56Nov 24, 2017Updated 8 years ago
- Scans for HTTP servers and finds given strings in HTTP body and HTTP response headers.☆35Dec 23, 2024Updated last year
- Fraud prevention tool☆28Aug 9, 2020Updated 5 years ago
- CIFv3 DeploymentKit☆64Apr 14, 2020Updated 5 years ago
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Feb 6, 2024Updated 2 years ago
- A defense tool - detect web shells in local directories via md5sum☆32Jul 18, 2019Updated 6 years ago
- Threat Hunting with ELK Workshop (InfoSecWorld 2017)☆65Oct 31, 2017Updated 8 years ago
- An automated Python script which installs an extra arsenal of penetration testing tools and utilities into Kali Linux.☆30Aug 22, 2017Updated 8 years ago
- Cheat sheets for threat hunting, detection and other stuff.☆34Oct 7, 2022Updated 3 years ago
- TLS scanning component of OWASP PurpleTeam☆11Feb 8, 2023Updated 3 years ago
- a python script that automates recon flow for a given target domain.☆10Apr 21, 2022Updated 3 years ago
- OSoMe API mashups☆11Jan 29, 2019Updated 7 years ago
- A collection of code (mostly Jupyter notebooks) associated with entries on my blog☆12Oct 8, 2017Updated 8 years ago
- ☆11Jan 28, 2019Updated 7 years ago
- a low(zero) cost threat intelligence&response tool against phishing domains☆157Dec 8, 2022Updated 3 years ago
- Text Mining Library with a focus on Latent Semantic Analysis☆12Aug 4, 2013Updated 12 years ago
- A beginners guide to exploiting Buffer Oveflow vulnerabilities using Ollydbg simular to offensive security techniques.☆10May 3, 2019Updated 6 years ago
- Code for drought detection and attribution using tree-ring reconstructions☆11Feb 19, 2019Updated 6 years ago
- Setup a RaspberryPi as a responder-in-a-box dropbox for Pentesting☆12Sep 22, 2017Updated 8 years ago
- DeTT&CT Editor☆12Jan 21, 2026Updated 3 weeks ago
- Scripts I have made for blue team☆16Apr 1, 2018Updated 7 years ago
- A platform of detailed R programming codes for Data Analytics☆16Sep 24, 2014Updated 11 years ago