Threat Hunter's Knowledge Base
☆22Dec 27, 2021Updated 4 years ago
Alternatives and similar repositories for Threat-Hunters-KB
Users that are interested in Threat-Hunters-KB are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Detection Ideas & Rules repository.☆178Sep 10, 2021Updated 4 years ago
- Code samples of querying the API services of Whois XML Api.☆12Dec 14, 2023Updated 2 years ago
- Repo for Automations and other solutions for Elastic SIEM/Security.☆18Jun 15, 2021Updated 4 years ago
- ssh user enumeration☆12Mar 21, 2023Updated 3 years ago
- Sysmon Tools for PowerShell☆12Aug 17, 2018Updated 7 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Client-side scripts provided by WhoisXML API, Inc., for clients using WHOIS data feeds to obtain bulk whois data or to set up a WHOIS da…☆19Jun 7, 2023Updated 2 years ago
- iTerm 2 Fallout color theme.☆12Dec 6, 2016Updated 9 years ago
- List of custom developed KQL queries to help proactive security teams hunt for opportunistic and sophisticated threat activity by develop…☆26Jun 30, 2021Updated 4 years ago
- This repo will contain all the codes and materials used in my computer science youtube channel https://www.youtube.com/channel/UC7J8myLv3…☆13Dec 24, 2023Updated 2 years ago
- Splunk App for MITRE Att&CK Navigator(TM)☆23Mar 25, 2021Updated 5 years ago
- A honeypot that can be used to observe traffic directed at home routers.☆20Nov 14, 2018Updated 7 years ago
- A collection of Splunk dashboard templates.☆15Apr 18, 2019Updated 6 years ago
- Cyber Threat Intelligence Appliance☆13Dec 8, 2022Updated 3 years ago
- Read Windows message table entries.☆11Feb 5, 2023Updated 3 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- This repo is where I store my Threat Hunting ideas/content☆89Mar 20, 2026Updated last week
- Sigma rules to share with the community☆124Jan 29, 2025Updated last year
- ☆14Feb 8, 2020Updated 6 years ago
- ☆11Mar 12, 2021Updated 5 years ago
- Welcome to the NCC Group Threat Intelligence Alert repo, here you will find the alerts which we have raised to our customers regarding in…☆25Feb 6, 2023Updated 3 years ago
- A collection of Security Bookmarks☆11Oct 9, 2021Updated 4 years ago
- https://pinkdraconian.gitbook.io/methodology/☆13Aug 24, 2021Updated 4 years ago
- Cheat sheets for threat hunting, detection and other stuff.☆34Oct 7, 2022Updated 3 years ago
- ☆10Mar 27, 2022Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- An Intro to Penetration Testing Workshop☆15May 31, 2018Updated 7 years ago
- Gradle plugin for JavaCard development☆12Mar 23, 2024Updated 2 years ago
- Splunk code (SPL) for serious threat hunters and detection engineers.☆292Jan 15, 2024Updated 2 years ago
- Random tips and tricks RE: ransomware☆14Aug 17, 2021Updated 4 years ago
- YAFRA is a semi-automated framework for analyzing and representing reports about IT Security incidents.☆27Dec 14, 2021Updated 4 years ago
- Zac's assorted config files☆10Jan 11, 2017Updated 9 years ago
- "A Practical Recipe for Hardware Implants" presentation materials.☆13Nov 10, 2020Updated 5 years ago
- pocket guide for core threat hunting concepts☆23May 6, 2020Updated 5 years ago
- ☆12Feb 8, 2023Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Oriana is a threat hunting tool that leverages a subset of Windows events to build relationships, calculate totals and run analytics. The…☆176Jun 10, 2021Updated 4 years ago
- An Ansible role to install and configure the ZNC IRC bouncer server.☆10Aug 4, 2019Updated 6 years ago
- OpenBugBounty - https://www.openbugbounty.org/ programs list☆23Mar 15, 2021Updated 5 years ago
- A suite of cybersecurity tools designed to allow for rapid deployment of virtualized environments. Intended for use in education: contain…☆15Nov 11, 2019Updated 6 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆11Jun 21, 2018Updated 7 years ago
- My set of notes and resources for Microsoft and other exams☆15Oct 20, 2021Updated 4 years ago
- Malleable C2 is a domain specific language to redefine indicators in Beacon's communication. This repository is a collection of Malleable…☆17May 18, 2021Updated 4 years ago