Security Content for the PEAK Threat Hunting Framework
☆47Feb 15, 2024Updated 2 years ago
Alternatives and similar repositories for PEAK
Users that are interested in PEAK are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Random scripts for azure stuff☆14Oct 12, 2022Updated 3 years ago
- Summarize CTI reports with OpenAI☆18Updated this week
- Baseline a Windows System against LOLBAS☆74Feb 2, 2026Updated 3 months ago
- A small crappy script I wrote that converts the Sigma Windows Process Creation events to KQL via PySigma. Designed for CI/CD☆10Nov 7, 2023Updated 2 years ago
- PowerShell tool for auditing Microsoft Entra ID Conditional Access policies and MFA compliance☆45Aug 2, 2025Updated 9 months ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Muteces (mutexes/mutants) used by various malware families☆24Nov 11, 2024Updated last year
- Practical Information Sharing between Law Enforcement and CSIRT communities using MISP☆35Sep 18, 2023Updated 2 years ago
- my MSTICpy practice and custom tools repository☆11Apr 23, 2025Updated last year
- A simple webshell in Go.☆14Aug 31, 2020Updated 5 years ago
- Cumulonimbus-UAL_Extractor is a PowerShell based tool created by the Tesorion CERT team to help gather the Unified Audit Logging out of a…☆21Oct 25, 2023Updated 2 years ago
- Detection rule validation☆41Oct 25, 2023Updated 2 years ago
- Anvilogic Forge☆118Mar 31, 2026Updated last month
- The king of shell -Javaweb Memory Shell☆27Mar 29, 2023Updated 3 years ago
- ⚠️ ARCHIVED**: This repository is no longer actively maintained. All Sigma rules are now managed and available in SIEM Rules☆12Mar 19, 2026Updated last month
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Script which is able to decrypt data sent to AzoRult 3.3 Server☆11Feb 5, 2021Updated 5 years ago
- ☆20Jan 18, 2022Updated 4 years ago
- A simple tool designed to create Atomic Red Team tests with ease.☆50Mar 11, 2025Updated last year
- A Splunk app to use MISP in background☆112Mar 27, 2026Updated last month
- A small tool to easily mount APFS image on macOS for forensics.☆16Jul 30, 2020Updated 5 years ago
- ☆22Jun 2, 2023Updated 2 years ago
- CIS Benchmark Audit Scripts☆25Jan 4, 2018Updated 8 years ago
- Radio streams that can be scrobbled by last.fm☆11Oct 8, 2024Updated last year
- Detection Ideas & Rules repository.☆178Sep 10, 2021Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Cyber Threat Intelligence☆79Dec 7, 2025Updated 4 months ago
- ☆12Feb 15, 2024Updated 2 years ago
- A security tool that detects malicious packages from external vulnerability feeds and searches for them in your package registries or art…☆69Nov 27, 2025Updated 5 months ago
- A C++ Yara Rule Runner☆13Apr 22, 2022Updated 4 years ago
- Not Another Code Injection Toolkit☆16Aug 19, 2021Updated 4 years ago
- A collection of awesome resources built for and around the Splunk Phantom platform.☆13Jul 7, 2020Updated 5 years ago
- ☆10Jul 1, 2023Updated 2 years ago
- Forensic Analysis Tool for Btrfs File System.☆20Aug 6, 2018Updated 7 years ago
- Installs ADDS and configures a vulnerable domain via a powershell script☆15Jul 13, 2023Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Web based analysis platform for use with the AWS_IR command line tool.☆17Aug 4, 2016Updated 9 years ago
- Allows you to build custom RSS feeds for email marketing☆17Sep 5, 2025Updated 7 months ago
- A utility for organizing Microsoft Outlook rules. The utility uses the rules export file, *.RWZ, to make changes.☆15May 7, 2020Updated 5 years ago
- Writing Your Own Ticket to the Cloud Like APT: A Deep-dive to AD FS Attacks, Detections, and Mitigations☆12Dec 9, 2022Updated 3 years ago
- Cobalt Strike notifications via NTFY.☆15Sep 24, 2024Updated last year
- Simple PowerShell script to enable process scanning with Yara.☆99Oct 4, 2022Updated 3 years ago
- Practical Threat Detection Engineering, Published by Packt☆88Apr 22, 2026Updated last week