Threat Hunter's Knowledge Base
☆22Dec 27, 2021Updated 4 years ago
Alternatives and similar repositories for Threat-Hunters-KB
Users that are interested in Threat-Hunters-KB are comparing it to the libraries listed below
Sorting:
- Detection Ideas & Rules repository.☆178Sep 10, 2021Updated 4 years ago
- Colection of different JUMPSEC advisories, guidance, and scripts for all of the latest vulnerabilities and adversaries☆13Oct 18, 2021Updated 4 years ago
- A honeypot that can be used to observe traffic directed at home routers.☆20Nov 14, 2018Updated 7 years ago
- Welcome to the NCC Group Threat Intelligence Alert repo, here you will find the alerts which we have raised to our customers regarding in…☆25Feb 6, 2023Updated 3 years ago
- List of custom developed KQL queries to help proactive security teams hunt for opportunistic and sophisticated threat activity by develop…☆26Jun 30, 2021Updated 4 years ago
- YAFRA is a semi-automated framework for analyzing and representing reports about IT Security incidents.☆27Dec 14, 2021Updated 4 years ago
- pocket guide for core threat hunting concepts☆23May 6, 2020Updated 5 years ago
- Phishing can't get any easier with Tilapia☆11Jan 2, 2023Updated 3 years ago
- Old home of LimaCharlie, open source EDR☆32Sep 4, 2023Updated 2 years ago
- Sigma rules to share with the community☆124Jan 29, 2025Updated last year
- Community content for LogRhythm Axon. Includes Dashboards, searches, analytics rules, processing policies and more.☆10Jul 26, 2024Updated last year
- Cheat sheets for threat hunting, detection and other stuff.☆34Oct 7, 2022Updated 3 years ago
- Azure Deployment Templates for Mandiant Managed Huning☆12Jun 1, 2023Updated 2 years ago
- iTerm 2 Fallout color theme.☆12Dec 6, 2016Updated 9 years ago
- Threat Response API Module☆10Oct 4, 2023Updated 2 years ago
- ☆12Jul 14, 2025Updated 7 months ago
- Azure-Sentinel-BYOML☆12Nov 8, 2019Updated 6 years ago
- Save contacts that you want don't want to show on the dailer. Black Book for saving contacts in python☆10Apr 30, 2023Updated 2 years ago
- Project that creates a Kubernetes environment in Azure (AKS) and protects it with CloudGuard CSPM / Workload and Appsec technologies☆10Jun 12, 2023Updated 2 years ago
- A Sega Master System and Game Gear Emulator for the Nintendo 64☆13Dec 5, 2025Updated 3 months ago
- Code samples of querying the API services of Whois XML Api.☆12Dec 14, 2023Updated 2 years ago
- How to bypass your Bell Aliant provided modems.☆13Feb 2, 2026Updated last month
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆11Jun 21, 2018Updated 7 years ago
- Public tools, scripts or code snippets that can help when working with our products☆46Feb 11, 2026Updated 3 weeks ago
- A collection of Splunk dashboard templates.☆15Apr 18, 2019Updated 6 years ago
- Student-created Linux Binary Exploitation course taught at George Mason University in the Spring and Fall semesters of 2021.☆10Dec 29, 2021Updated 4 years ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- Zero Trust Network Framework☆10Sep 29, 2019Updated 6 years ago
- 🏛️ Open-source toolkit for accessing SEC EDGAR financial data with Python and TypeScript/JavaScript SDKs. Features comprehensive parsing…☆24Aug 13, 2025Updated 6 months ago
- ☆12Feb 8, 2023Updated 3 years ago
- The Trader Gateway of Distributed Commodities OTC Electronic Trading System☆13Jun 12, 2018Updated 7 years ago
- Powershell payloads for hacking attack. powershell are created for windows automation but hackers use it to hack devices illegally.☆11Aug 6, 2022Updated 3 years ago
- Oriana is a threat hunting tool that leverages a subset of Windows events to build relationships, calculate totals and run analytics. The…☆176Jun 10, 2021Updated 4 years ago
- Quick and dirty python script/systemd service that will watch a log file and spit out some or all contents to Slack via webhook.☆10Sep 2, 2020Updated 5 years ago
- Small and highly portable detection tests based on MITRE's ATT&CK.☆10Feb 17, 2025Updated last year
- ☆14Feb 8, 2020Updated 6 years ago
- Automated Real-Time Threat Hunting with ATD, Active Response and Elasticsearch/Kibana☆10Aug 17, 2018Updated 7 years ago
- Active Response plugin. Osquery to execute wazuh/ossec active response plugins. You can write your own plugins, easy to plug☆11Jun 20, 2020Updated 5 years ago
- GeeekPi UPS restore on power loss feature fix with 555 timer.☆10Dec 16, 2020Updated 5 years ago