Security Content for the PEAK Threat Hunting Framework
☆45Feb 15, 2024Updated 2 years ago
Alternatives and similar repositories for PEAK
Users that are interested in PEAK are comparing it to the libraries listed below
Sorting:
- Random scripts for azure stuff☆14Oct 12, 2022Updated 3 years ago
- Baseline a Windows System against LOLBAS☆73Feb 2, 2026Updated last month
- Summarize CTI reports with OpenAI☆18Updated this week
- Documentation and tools to curate Sigma rules for Windows event logs into easier to parse rules.☆16Oct 22, 2025Updated 5 months ago
- A small crappy script I wrote that converts the Sigma Windows Process Creation events to KQL via PySigma. Designed for CI/CD☆10Nov 7, 2023Updated 2 years ago
- PowerShell tool for auditing Microsoft Entra ID Conditional Access policies and MFA compliance☆37Aug 2, 2025Updated 7 months ago
- Muteces (mutexes/mutants) used by various malware families☆23Nov 11, 2024Updated last year
- Scripts to help and speed up reversing activities☆13Jan 12, 2026Updated 2 months ago
- ☆14Mar 6, 2023Updated 3 years ago
- Practical Information Sharing between Law Enforcement and CSIRT communities using MISP☆35Sep 18, 2023Updated 2 years ago
- my MSTICpy practice and custom tools repository☆11Apr 23, 2025Updated 10 months ago
- A simple webshell in Go.☆15Aug 31, 2020Updated 5 years ago
- Detection rule validation☆40Oct 25, 2023Updated 2 years ago
- Cumulonimbus-UAL_Extractor is a PowerShell based tool created by the Tesorion CERT team to help gather the Unified Audit Logging out of a…☆21Oct 25, 2023Updated 2 years ago
- The king of shell -Javaweb Memory Shell☆26Mar 29, 2023Updated 2 years ago
- ⚠️ ARCHIVED**: This repository is no longer actively maintained. All Sigma rules are now managed and available in SIEM Rules☆12Updated this week
- Script which is able to decrypt data sent to AzoRult 3.3 Server☆11Feb 5, 2021Updated 5 years ago
- ☆20Jan 18, 2022Updated 4 years ago
- A collection of awesome resources built for and around the Splunk Phantom platform.☆14Jul 7, 2020Updated 5 years ago
- A Splunk app to use MISP in background☆112Jan 8, 2026Updated 2 months ago
- A simple tool designed to create Atomic Red Team tests with ease.☆50Mar 11, 2025Updated last year
- A small tool to easily mount APFS image on macOS for forensics.☆16Jul 30, 2020Updated 5 years ago
- Cyber Threat Intelligence☆78Dec 7, 2025Updated 3 months ago
- ☆22Jun 2, 2023Updated 2 years ago
- CIS Benchmark Audit Scripts☆25Jan 4, 2018Updated 8 years ago
- Detection Ideas & Rules repository.☆178Sep 10, 2021Updated 4 years ago
- Installs ADDS and configures a vulnerable domain via a powershell script☆13Jul 13, 2023Updated 2 years ago
- ☆12Feb 15, 2024Updated 2 years ago
- A security tool that detects malicious packages from external vulnerability feeds and searches for them in your package registries or art…☆69Nov 27, 2025Updated 3 months ago
- Generate YARA rules for OOXML documents.☆38Jun 1, 2023Updated 2 years ago
- Not Another Code Injection Toolkit☆16Aug 19, 2021Updated 4 years ago
- ☆10Jul 1, 2023Updated 2 years ago
- Forensic Analysis Tool for Btrfs File System.☆20Aug 6, 2018Updated 7 years ago
- Web based analysis platform for use with the AWS_IR command line tool.☆17Aug 4, 2016Updated 9 years ago
- ☆15May 3, 2024Updated last year
- Cobalt Strike notifications via NTFY.☆15Sep 24, 2024Updated last year
- Simple PowerShell script to enable process scanning with Yara.☆98Oct 4, 2022Updated 3 years ago
- Practical Threat Detection Engineering, Published by Packt☆87Mar 2, 2026Updated 2 weeks ago
- Windows file metadata / forensic tool.☆18Oct 12, 2025Updated 5 months ago