A Python library to help with some common threat hunting data analysis operations
☆142Apr 23, 2023Updated 2 years ago
Alternatives and similar repositories for huntlib
Users that are interested in huntlib are comparing it to the libraries listed below
Sorting:
- Python script to automatically create sigma rules from The hive observables☆25Mar 17, 2019Updated 6 years ago
- InvestigationPlaybookSpec☆71Sep 26, 2017Updated 8 years ago
- ☆14May 30, 2018Updated 7 years ago
- Splunk Boss of the SOC v1 data set.☆113Jun 13, 2018Updated 7 years ago
- Open Source Security Events Metadata (OSSEM)☆1,288Feb 27, 2023Updated 3 years ago
- Bro/Zeek integration with osquery☆93Nov 2, 2020Updated 5 years ago
- Repository containing Jupyter Notebooks for working with OSQuery tables and data☆17May 8, 2020Updated 5 years ago
- A threat hunting / data analysis environment based on Python, Pandas, PySpark and Jupyter Notebook.☆252Jul 19, 2021Updated 4 years ago
- Bro IDS + ELK Stack to detect and block data exfiltration☆46Oct 31, 2018Updated 7 years ago
- Searches For Threat Hunting and Security Analytics☆238Mar 26, 2025Updated 11 months ago
- Firepit - STIX Columnar Storage☆18Jun 5, 2024Updated last year
- EventList☆377Mar 21, 2021Updated 4 years ago
- Signature engine for all your logs☆172Nov 13, 2023Updated 2 years ago
- An open source framework for enterprise level automated analysis.☆394Jun 27, 2022Updated 3 years ago
- Reconstruct process trees from event logs☆147Aug 12, 2020Updated 5 years ago
- Automated, Collection, and Enrichment Platform☆324Nov 14, 2019Updated 6 years ago
- Flexible framework that allows automation to process cyber threat information and update endpoint defense tools.☆20Oct 24, 2018Updated 7 years ago
- Analyst tool for creating pivot maps of data sources☆16Sep 11, 2017Updated 8 years ago
- Oriana is a threat hunting tool that leverages a subset of Windows events to build relationships, calculate totals and run analytics. The…☆177Jun 10, 2021Updated 4 years ago
- ☆42Sep 16, 2022Updated 3 years ago
- Graph platform for Detection and Response☆699Dec 26, 2022Updated 3 years ago
- Threat Alert Logic Repository☆93Feb 7, 2019Updated 7 years ago
- Dockerfiles for NSM tools☆84Apr 14, 2017Updated 8 years ago
- A collection of notebooks built for defensive and offensive operations.☆77Oct 13, 2020Updated 5 years ago
- ☆24Mar 29, 2020Updated 5 years ago
- Assimilate is a series of scripts for using the Naïve Bayes algorithm to find potential malicious activity in HTTP headers☆93Oct 15, 2017Updated 8 years ago
- Detect Tactics, Techniques & Combat Threats☆2,263Jan 21, 2026Updated last month
- SANS Hunting on the Cheap☆36Apr 12, 2016Updated 9 years ago
- A Splunk app mapped to MITRE ATT&CK to guide your threat hunts☆1,173Jul 26, 2023Updated 2 years ago
- Zeek plugin to generate data on per-packet sizes and intervals☆14Apr 21, 2020Updated 5 years ago
- Expert Investigation Guides☆51Mar 18, 2021Updated 4 years ago
- ☆25Aug 14, 2015Updated 10 years ago
- Automatically create YARA rules from malicious documents.☆211May 16, 2022Updated 3 years ago
- File Scanning Framework☆294Sep 15, 2021Updated 4 years ago
- A modern Python-3-based alternative to RegRipper☆205Mar 31, 2025Updated 11 months ago
- Python script to decode common encoded PowerShell scripts☆217Jun 13, 2018Updated 7 years ago
- Modular file scanning/analysis framework☆622Oct 8, 2019Updated 6 years ago
- Exporting MISP event attributes to yara rules usable with Thor apt scanner☆24Mar 27, 2017Updated 8 years ago
- CyCAT.org taxonomies☆15May 22, 2021Updated 4 years ago