An informational repo about hunting for adversaries in your IT environment.
☆14Apr 10, 2017Updated 9 years ago
Alternatives and similar repositories for ThreatHunting
Users that are interested in ThreatHunting are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- mindmap created for tools can be used during analysis/investigation☆28Jan 4, 2017Updated 9 years ago
- Checks observables/ioc in TheHive/Cortex against the MISP warningslists☆14Dec 27, 2017Updated 8 years ago
- My Year of Python Repository☆28Jun 13, 2020Updated 5 years ago
- Various DFIR Tools☆27Jul 23, 2018Updated 7 years ago
- Recover event log entries from an image by heurisitically looking for record structures.☆26Oct 9, 2015Updated 10 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ircollect☆31Aug 7, 2013Updated 12 years ago
- Use DNS to hunt for threats including DGAs☆15Jan 4, 2016Updated 10 years ago
- Modified edition of cuckoo☆18Feb 14, 2018Updated 8 years ago
- Wrapper for TSK (Sleuth Kit) Bindings☆12Jan 10, 2023Updated 3 years ago
- Tool to parse SRU database☆25Mar 1, 2018Updated 8 years ago
- My personal experience in Threat Hunting and knowledge gained so far.☆19May 27, 2017Updated 8 years ago
- Collection of malware ioc hashes from blog posts. A Python script is provided to search through it.☆19Sep 10, 2020Updated 5 years ago
- DeployREMnux is a Python script that will deploy a cloud instance of the public REMnux distribution in the Amazon cloud (AWS).☆16Dec 20, 2019Updated 6 years ago
- A collection of Cortex Analyzers and Responders for TheHive/Cortex☆13Jan 29, 2020Updated 6 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Integrating Sysinternals Autoruns’ logs into Security Onion☆31Feb 20, 2024Updated 2 years ago
- Simple Microsoft Windows sessions event logs visualization☆154May 2, 2022Updated 4 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Apr 5, 2020Updated 6 years ago
- extract and parse WEVT_TEMPLATEs from PE files☆18Dec 30, 2023Updated 2 years ago
- PERCEIVE is a project incubator inspired by Apache Incubator and Stack Exchange's Area 51. It serves as a staging zone repository for the…☆13May 21, 2018Updated 8 years ago
- Collection of best practices to add OSINT into MISP and/or MISP communities☆65Sep 29, 2023Updated 2 years ago
- Collection of scripts, patterns, tips, notes, etc for Obsidian.md users☆14Mar 5, 2025Updated last year
- Parses the FireEye HX .mans triage collections and sends them to ElasticSearch☆17Feb 17, 2023Updated 3 years ago
- Top DNS Measurement for Bro☆10Aug 22, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Visualization of interaction between entities☆17Nov 28, 2016Updated 9 years ago
- VirusTotal SIEM Integration and Automation☆18Jan 16, 2017Updated 9 years ago
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, i…☆19Jan 28, 2022Updated 4 years ago
- Bootable Gentoo image for USB armory, with Linux 4.3.0☆12Mar 25, 2017Updated 9 years ago
- A script to create and assign SOP tasks into the cases☆20Aug 16, 2020Updated 5 years ago
- Resources and materials for DEF CON 2018 Packet Hunting Workshop☆80Aug 12, 2018Updated 7 years ago
- Kibana 5 Templates for Suricata IDPS☆43May 30, 2018Updated 7 years ago
- \ PowerAvails Powershell /☆10Jun 30, 2018Updated 7 years ago
- Mobile detector for radiation mapping - similar to SAFECAST bGeigie Nano☆15Updated this week
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- AWS KMS Encryption & Decyption using CLI & Lambda☆10Apr 12, 2021Updated 5 years ago
- Generate JSON force-directed/ node graph data from MITRE's ATTACK framework and visualize it interactively☆39Apr 19, 2025Updated last year
- Monitoring tool for PasteBin-alike sites written in Python. Inspired by pastemon http://github.com/xme/pastemon☆44Jan 31, 2021Updated 5 years ago
- NCT5104D GPIO Linux Driver☆13Jan 5, 2024Updated 2 years ago
- http://moaistory.blogspot.com/2016/08/ie10analyzer.html☆20Jul 20, 2024Updated last year
- Indicator of Compromise Mapping Service☆12Apr 15, 2014Updated 12 years ago
- TIBER-Cases is a project created to give cases of The Hive platform for Threat Intelligence Analysts mainly. All the cases are mapped to …☆27Jul 13, 2022Updated 3 years ago