target / Threat-HuntingLinks
Jupyter notebooks for threat hunting
☆59Updated 5 months ago
Alternatives and similar repositories for Threat-Hunting
Users that are interested in Threat-Hunting are comparing it to the libraries listed below
Sorting:
- ☆12Updated 10 months ago
- Invoke-Forensics provides PowerShell commands to simplify working with the forensic tools KAPE and RegRipper.☆115Updated last year
- A PowerShell incident response script for quick triage☆80Updated 3 years ago
- ☆65Updated 2 years ago
- ☆88Updated last month
- Collection of scripts provided for public use☆37Updated 3 weeks ago
- Notes on responding to security breaches relating to Azure AD☆116Updated 3 years ago
- Full of public notes and Utilities☆127Updated 7 months ago
- Random notes collected on the intertubes relating to DFIR☆34Updated 2 years ago
- Detection Ideas & Rules repository.☆179Updated 4 years ago
- This repository contains helper scripts and custom configs to get the best out of Google's Timesketch project.☆113Updated last year
- ☆35Updated 10 months ago
- A script that updates KAPE (using Get-KAPEUpdate.ps1) as well as EZ Tools (within .\KAPE\Modules\bin) and the ancillary files that enhanc…☆57Updated 2 months ago
- ☆73Updated 10 months ago
- A browser extension for threat hunting that provides one UI for different SIEMs/EDRs and simplifies investigation☆77Updated last year
- A repository of my own Sigma detection rules.☆161Updated last year
- Cyber Range including Velociraptor + HELK system with a Windows VM for security testing and R&D. Azure and AWS terraform support.☆135Updated 2 years ago
- Project based on RegRipper, to extract add'l value/pivot points from TLN events file☆87Updated 7 months ago
- ☆68Updated last month
- Repository of attack and defensive information for Business Email Compromise investigations☆261Updated 4 months ago
- Memory Baseliner is a script that can compare two windows memory images or perform frequency of occurrence / data stacking analysis on mu…☆54Updated 2 years ago
- A dataset containing Office 365 Unified Audit Logs for security research and detection☆54Updated 3 years ago
- A repository to share publicly available Velociraptor detection content☆186Updated last week
- User Feedback Space of #MitreAssistant☆37Updated 2 years ago
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆155Updated 3 years ago
- Script to automate Linux live evidence collection☆27Updated 3 years ago
- List of custom developed KQL queries to help proactive security teams hunt for opportunistic and sophisticated threat activity by develop…☆27Updated 4 years ago
- Provides an advanced input.conf file for Windows and 3rd party related software with more than 70 different event log mapped to the MITRE…☆94Updated 2 months ago
- ☆42Updated last year
- Repository of public reference frameworks for the DFIR community.☆118Updated 2 years ago