Threat Hunter's Knowledge Base
☆22Dec 27, 2021Updated 4 years ago
Alternatives and similar repositories for Threat-Hunters-KB
Users that are interested in Threat-Hunters-KB are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Detection Ideas & Rules repository.☆178Sep 10, 2021Updated 4 years ago
- Repo for Automations and other solutions for Elastic SIEM/Security.☆18Jun 15, 2021Updated 4 years ago
- Colection of different JUMPSEC advisories, guidance, and scripts for all of the latest vulnerabilities and adversaries☆13Oct 18, 2021Updated 4 years ago
- ssh user enumeration☆12Mar 21, 2023Updated 3 years ago
- Sysmon Tools for PowerShell☆12Aug 17, 2018Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Client-side scripts provided by WhoisXML API, Inc., for clients using WHOIS data feeds to obtain bulk whois data or to set up a WHOIS da…☆19Jun 7, 2023Updated 2 years ago
- List of custom developed KQL queries to help proactive security teams hunt for opportunistic and sophisticated threat activity by develop…☆26Jun 30, 2021Updated 4 years ago
- Splunk App for MITRE Att&CK Navigator(TM)☆23Mar 25, 2021Updated 5 years ago
- A honeypot that can be used to observe traffic directed at home routers.☆20Nov 14, 2018Updated 7 years ago
- A collection of Splunk dashboard templates.☆15Apr 18, 2019Updated 7 years ago
- Cyber Threat Intelligence Appliance☆13Dec 8, 2022Updated 3 years ago
- Read Windows message table entries.☆11Feb 5, 2023Updated 3 years ago
- This repo is where I store my Threat Hunting ideas/content☆89Mar 20, 2026Updated 3 weeks ago
- Validates username & password combination(s) across a host or group of hosts using the SMB protocol.☆15Apr 6, 2020Updated 6 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Old home of LimaCharlie, open source EDR☆32Sep 4, 2023Updated 2 years ago
- ☆14Feb 8, 2020Updated 6 years ago
- Splunk Searches and Dashboards for DNS Threat Hunting☆11Mar 5, 2018Updated 8 years ago
- ☆11Mar 12, 2021Updated 5 years ago
- Welcome to the NCC Group Threat Intelligence Alert repo, here you will find the alerts which we have raised to our customers regarding in…☆25Feb 6, 2023Updated 3 years ago
- ☆12Jun 24, 2022Updated 3 years ago
- A collection of Security Bookmarks☆11Oct 9, 2021Updated 4 years ago
- Zero Trust Network Framework☆10Sep 29, 2019Updated 6 years ago
- An Intro to Penetration Testing Workshop☆15May 31, 2018Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Gradle plugin for JavaCard development☆12Mar 23, 2024Updated 2 years ago
- Splunk code (SPL) for serious threat hunters and detection engineers.☆292Jan 15, 2024Updated 2 years ago
- Random tips and tricks RE: ransomware☆14Aug 17, 2021Updated 4 years ago
- "A Practical Recipe for Hardware Implants" presentation materials.☆13Nov 10, 2020Updated 5 years ago
- ☆12Feb 8, 2023Updated 3 years ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- ☆11Jan 25, 2024Updated 2 years ago
- Malware campaigns and APTs research by BlackArrow☆19Apr 30, 2020Updated 5 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆11Jun 21, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Malleable C2 is a domain specific language to redefine indicators in Beacon's communication. This repository is a collection of Malleable…☆17May 18, 2021Updated 4 years ago
- Web Authentication with X509 smart cards☆16Nov 18, 2024Updated last year
- Searches For Threat Hunting and Security Analytics☆239Mar 26, 2025Updated last year
- Allows to pull asset and identity data into Splunk app for Enterprise Security from LDAP and other sources☆28Feb 23, 2018Updated 8 years ago
- Just another useless C2 occupying space in some HDD somewhere.☆22Jul 4, 2023Updated 2 years ago
- Automatically attack all file shares within AD network environment. Exploiting weak permissions.☆17Aug 2, 2019Updated 6 years ago
- Student-created Linux Binary Exploitation course taught at George Mason University in the Spring and Fall semesters of 2021.☆10Dec 29, 2021Updated 4 years ago