w8mej / ThreatPlaysView external linksLinks
Sharing Threat Hunting runbooks
☆25Jul 5, 2019Updated 6 years ago
Alternatives and similar repositories for ThreatPlays
Users that are interested in ThreatPlays are comparing it to the libraries listed below
Sorting:
- A curated threat modeling library collection☆24Dec 1, 2023Updated 2 years ago
- Powershell collection designed to assist in Threat Hunting Windows systems.☆27Apr 13, 2018Updated 7 years ago
- ☆27Dec 6, 2013Updated 12 years ago
- A multi-cloud setup of managed Kubernetes Clusters.☆20Mar 8, 2024Updated last year
- Enables scanning of docker builds in CircleCi for OS package vulnerabilities.☆13Mar 6, 2020Updated 5 years ago
- An attempt to automated hunting for delegation access across the domain☆27Jan 17, 2019Updated 7 years ago
- A small JS library to generate parametric SVG images of locks and keys, animate them and integrate onto web pages. Released as a support…☆17Aug 10, 2022Updated 3 years ago
- A scapy based module for programming offensive and defensive networking tools easier than before.☆16Mar 17, 2021Updated 4 years ago
- ☆14Jun 28, 2017Updated 8 years ago
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Apr 10, 2020Updated 5 years ago
- This Repository consists all Public Cheatsheets created by BlackPerl DFIR Content Team☆20Oct 9, 2024Updated last year
- My personal experience in Threat Hunting and knowledge gained so far.☆19May 27, 2017Updated 8 years ago
- ☆31Feb 24, 2014Updated 11 years ago
- The Fastest way to consume Threat Intel☆26Apr 30, 2022Updated 3 years ago
- Tool to check compliance with CIS Linux Benchmarks, specifically Distribution Independent, Debian 9 and Ubuntu 18.04 LTS, and generate sp…☆25Oct 2, 2020Updated 5 years ago
- Decentralized Cyber Threat Intelligence Kaizen Framework☆27Jan 31, 2022Updated 4 years ago
- POC code to crash Windows Event Logger Service☆27Oct 16, 2020Updated 5 years ago
- A free incident response management and documentation workbook☆25Nov 13, 2018Updated 7 years ago
- Tool for red teamers to decode keys and master keys from side channel information. Released at DEF CON 28.☆32Aug 23, 2020Updated 5 years ago
- Detecting ATT&CK techniques & tactics for Linux☆257Oct 1, 2020Updated 5 years ago
- A repository of curated lists with elements such as IoCs to use for threat hunting & detection queries.☆33Jul 23, 2024Updated last year
- Practical Information Sharing between Law Enforcement and CSIRT communities using MISP☆35Sep 18, 2023Updated 2 years ago
- A module for working with Windows Event Collector service and maintain Windows Event Forwarding subscriptions.☆34Dec 14, 2025Updated 2 months ago
- Threat Hunting & Incident Investigation with Osquery☆216Mar 30, 2022Updated 3 years ago
- Searches for Insider Threat Hunting☆29May 2, 2019Updated 6 years ago
- Hunting Queries for Defender ATP☆83Dec 14, 2025Updated 2 months ago
- Executive coaching skill for planning your 2026 using research-backed process goals. Works with Claude Code and Claude.ai.☆25Jan 5, 2026Updated last month
- Crossword client for Ubuntu☆10Sep 9, 2018Updated 7 years ago
- Script hecho en python, para sacar la IP, de las paginas web.☆11Aug 25, 2022Updated 3 years ago
- FARO - Document Sensitivity Detector☆10Sep 30, 2022Updated 3 years ago
- A CVRF CSAF Converter, taking care about OASIS specification.☆10Jun 4, 2025Updated 8 months ago
- CloudPathSniffer is an open-source, easy to use and extensible Cloud Anomaly Detection platform designed to help security teams to find h…☆13Nov 30, 2023Updated 2 years ago
- The Python Password-Protected Obfuscator☆33Jul 7, 2019Updated 6 years ago
- the fastest way to consume threat intelligence.☆31Mar 9, 2023Updated 2 years ago
- ☆77Jun 25, 2019Updated 6 years ago
- Tools, techniques, cheat sheets, and other resources to assist those defending organizations and detecting adversaries☆458Feb 4, 2022Updated 4 years ago
- Best practices in threat intelligence☆50Nov 6, 2022Updated 3 years ago
- Python module to interact with the MITRE attack framework via the MITRE API☆88Nov 14, 2017Updated 8 years ago
- Fast lookup server for NSRL and other hash database used in digital forensic☆48Jan 26, 2026Updated 3 weeks ago