π»ββοΈ πΉ Threat hunting with Polars and flaws.cloud AWS CloudTrail datasets.
β14May 22, 2024Updated last year
Alternatives and similar repositories for hunts
Users that are interested in hunts are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- β11Dec 9, 2025Updated 3 months ago
- Hundred Days of Yara Challengeβ12Jun 21, 2022Updated 3 years ago
- Storage for the IOCs I collectβ11Mar 26, 2025Updated last year
- Collect AWS logs and query them instantly with SQL! Open source CLI. No DB required.β16Updated this week
- Turn any blog into structured threat intelligence.β54Updated this week
- Open source password manager - Proton Pass β’ AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Convert Sigma rules to SIEM queries, directly in your browser.β114Jan 24, 2026Updated 2 months ago
- β18Dec 20, 2024Updated last year
- β30Jan 13, 2026Updated 2 months ago
- A tool to generate datasets and models based on vulnerabilities descriptions from @Vulnerability-Lookup.β23Updated this week
- An open-source command-line tool for cybersecurity reporting automation and a configuration language for reusable templates. Reporting-asβ¦β67Jul 6, 2025Updated 8 months ago
- Repo for experimenting and testing MCP server builds for CTI-related research.β27May 13, 2025Updated 10 months ago
- Data perimeter helper is a tool that helps you design and anticipate the impact of your data perimeter controlsβ17Jan 21, 2026Updated 2 months ago
- Deep Dork Web is a browser-based tool designed to automate Google Dork searches for ethical security research. It supports advanced queriβ¦β20Mar 13, 2025Updated last year
- A dataset with CloudTrail events from an attack simulation using Stratus.β25Jul 12, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling on Cloudways β’ AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Firepit - STIX Columnar Storageβ18Jun 5, 2024Updated last year
- Small cyber challenges for fun and no profitβ12May 20, 2025Updated 10 months ago
- Maintains backlink structure among interlinked Markdown notesβ11Dec 28, 2020Updated 5 years ago
- A dataset containing Office 365 Unified Audit Logs for security research and detectionβ58Jun 7, 2022Updated 3 years ago
- Actionable data for Security Operationsβ19Aug 26, 2021Updated 4 years ago
- β15Aug 31, 2023Updated 2 years ago
- DΓ©tection d'anomalie Γ partir des journaux d'authentification Windowsβ18Apr 16, 2021Updated 4 years ago
- Awesome Splunk SPL hunt queries that can be used to detect the latest vulnerability exploitation attempts & subsequent compromiseβ68Apr 29, 2024Updated last year
- A repository hosting example goodware evtx logs containing sample software installation and basic user interactionβ88Mar 11, 2026Updated 2 weeks ago
- Proton VPN Special Offer - Get 70% off β’ AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- This is a repository to experiment with MCP for securityβ47Jan 22, 2025Updated last year
- β21Oct 31, 2025Updated 4 months ago
- CocktailParty is a data broker system based on phoenix frameworkβ23Apr 23, 2025Updated 11 months ago
- Windows Security Loggingβ43Jul 17, 2022Updated 3 years ago
- A YARA rules repository continuously updated for monitoring the old and new threats from articles, incidents responses ...β141Nov 19, 2023Updated 2 years ago
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitionersβ117Oct 29, 2024Updated last year
- β17Sep 29, 2023Updated 2 years ago
- Archive of the official Microsoft VibeVoice repository (7B & 1.5B). Backup of the deleted source code for the open-source TTS models, incβ¦β28Sep 5, 2025Updated 6 months ago
- A minimalist Hugo theme that helps you build fully responsive documentation websites for small projects.β10Oct 19, 2021Updated 4 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI β’ AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- IOK (Indicator Of Kit) is an open source language and ruleset for detecting phishing threat actor tools and tacticsβ190Apr 24, 2025Updated 11 months ago
- Jupyter Notebooks for Cyber Threat Intelligenceβ35Sep 14, 2023Updated 2 years ago
- CloudPathSniffer is an open-source, easy to use and extensible Cloud Anomaly Detection platform designed to help security teams to find hβ¦β13Nov 30, 2023Updated 2 years ago
- This repository contains Splunk queries to hunt some anomaliesβ46Jul 28, 2022Updated 3 years ago
- Asset inventory of over 800 public bug bounty programs.β12Jun 12, 2023Updated 2 years ago
- A Cloud Guru Maker Lab on API constructionβ11Aug 6, 2018Updated 7 years ago
- Tool that gathers a customizable set of ETW telemetry and generates user-defined detectionsβ47Jan 28, 2026Updated 2 months ago