thirdeyeintelligence / Memoirs-of-a-Threat-HunterView external linksLinks
My personal experience in Threat Hunting and knowledge gained so far.
☆19May 27, 2017Updated 8 years ago
Alternatives and similar repositories for Memoirs-of-a-Threat-Hunter
Users that are interested in Memoirs-of-a-Threat-Hunter are comparing it to the libraries listed below
Sorting:
- Code, commands, and chatter about Threat Hunting.☆35Jan 5, 2020Updated 6 years ago
- This repo is dedicated to all my tricks, tweaks and modules for testing and hunting threats. This repo contains multiple directories whic…☆57Jan 10, 2018Updated 8 years ago
- How can you track the hunting techniques you come up with?☆13Sep 3, 2017Updated 8 years ago
- This directory contains random scripts from threat hunting or malware research☆11Feb 15, 2018Updated 8 years ago
- Spider or repeater to find all links.☆10Feb 7, 2021Updated 5 years ago
- mindmap created for tools can be used during analysis/investigation☆28Jan 4, 2017Updated 9 years ago
- The repository contains IOCs in CSV format for APT, Cyber Crimes, Malware and Trojan and whatever I found as part of hunting and research☆12Jun 10, 2017Updated 8 years ago
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆12Oct 23, 2016Updated 9 years ago
- Bro analyzer that detects Google's QUIC protocol☆10Mar 2, 2021Updated 4 years ago
- Network Defender Toolkit☆18Jun 11, 2013Updated 12 years ago
- Ansible playbooks to facilitate redteam stuff☆14Aug 2, 2016Updated 9 years ago
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆29Dec 8, 2022Updated 3 years ago
- irCRpull is a PowerShell script utilized to pull several system artifacts, utilizing the free tool CrowdResponse, from a live Win7+ syste…☆14Mar 25, 2015Updated 10 years ago
- Runs sshd as a unprivileged user for persistence☆11Jun 23, 2019Updated 6 years ago
- Burp extension for automated handling of CSRF tokens☆16Feb 27, 2018Updated 7 years ago
- NimSkrull is an adaption from the original Skrull malware anti-copy DRM. Only for the anti-copy feature. (https://github.com/aaaddress1/S…☆13May 20, 2023Updated 2 years ago
- ☆12Nov 25, 2020Updated 5 years ago
- Honeybadger Red Edition☆13Sep 13, 2017Updated 8 years ago
- Evil snippets of Underhanded Red Team tactics☆11Jul 5, 2017Updated 8 years ago
- A collection of infosec related scripts and information.☆53Oct 2, 2024Updated last year
- An informational repo about hunting for adversaries in your IT environment.☆14Apr 10, 2017Updated 8 years ago
- Obfuscated Invoke-Mimikatz script☆13May 29, 2018Updated 7 years ago
- Notes on offensive training☆16Nov 29, 2017Updated 8 years ago
- Spin up a reverse proxy quickly on Heroku☆15Dec 5, 2020Updated 5 years ago
- Using osquery for Mass Incident Detection & Response☆19Jun 25, 2016Updated 9 years ago
- ☆18Jun 8, 2018Updated 7 years ago
- Threat Hunting with ELK Workshop (InfoSecWorld 2017)☆65Oct 31, 2017Updated 8 years ago
- A curated list of rootkits found on Github and other sites.☆66May 18, 2017Updated 8 years ago
- Monitoring tool for PasteBin-alike sites written in Python. Inspired by pastemon http://github.com/xme/pastemon☆44Jan 31, 2021Updated 5 years ago
- This repository contains all public indicators identified by 401trg during the course of our investigations. It also includes relevant ya…☆121Apr 14, 2021Updated 4 years ago
- Knowledge base of analytics designed to cover threats based on MITRE's ATT&CK.☆23Dec 13, 2018Updated 7 years ago
- Various shell code I have written☆17Oct 9, 2020Updated 5 years ago
- Automate bug bounty recon using bash alias☆15Aug 6, 2024Updated last year
- A repository to share contributions related to TheHive Project☆22Sep 15, 2021Updated 4 years ago
- VPS Network Cloud Web Applications☆25Nov 3, 2025Updated 3 months ago
- Scans the internet for open FTP servers looking for common malware bot droppers and grabs them for sampling. Also provides support for up…☆49Feb 15, 2017Updated 9 years ago
- A threat hunting / data analysis environment based on Python, Pandas, PySpark and Jupyter Notebook.☆252Jul 19, 2021Updated 4 years ago
- Quick Start/Setup of CI/CD for Offensive/Defensive Purposes☆21Sep 4, 2021Updated 4 years ago
- Repository for Security Workshop content☆20Sep 4, 2017Updated 8 years ago