Sharing Threat Hunting runbooks
☆25Jul 5, 2019Updated 6 years ago
Alternatives and similar repositories for ThreatPlays
Users that are interested in ThreatPlays are comparing it to the libraries listed below
Sorting:
- A curated threat modeling library collection☆24Dec 1, 2023Updated 2 years ago
- Powershell collection designed to assist in Threat Hunting Windows systems.☆27Apr 13, 2018Updated 7 years ago
- A multi-cloud setup of managed Kubernetes Clusters.☆20Mar 8, 2024Updated 2 years ago
- ☆27Dec 6, 2013Updated 12 years ago
- Enables scanning of docker builds in CircleCi for OS package vulnerabilities.☆13Mar 6, 2020Updated 6 years ago
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Apr 10, 2020Updated 5 years ago
- ☆14Jun 28, 2017Updated 8 years ago
- A small JS library to generate parametric SVG images of locks and keys, animate them and integrate onto web pages. Released as a support…☆18Aug 10, 2022Updated 3 years ago
- A scapy based module for programming offensive and defensive networking tools easier than before.☆17Mar 17, 2021Updated 4 years ago
- Collection of PowerShell functinos and scripts a Blue Teamer might use☆88Oct 4, 2023Updated 2 years ago
- This Repository consists all Public Cheatsheets created by BlackPerl DFIR Content Team☆20Oct 9, 2024Updated last year
- ☆31Feb 24, 2014Updated 12 years ago
- The Fastest way to consume Threat Intel☆26Apr 30, 2022Updated 3 years ago
- Tool to check compliance with CIS Linux Benchmarks, specifically Distribution Independent, Debian 9 and Ubuntu 18.04 LTS, and generate sp…☆25Oct 2, 2020Updated 5 years ago
- Tool for red teamers to decode keys and master keys from side channel information. Released at DEF CON 28.☆33Aug 23, 2020Updated 5 years ago
- A free incident response management and documentation workbook☆25Nov 13, 2018Updated 7 years ago
- An open source project aimed to replicate the Windows SIFT Machine and tools used during SANS Courses minus any payware software.☆25Oct 18, 2023Updated 2 years ago
- Intelligence around common attacker behaviors (MITRE ATT&CK TTPs), in the form of ATT&CK Navigator "layer" json files.☆36Aug 12, 2022Updated 3 years ago
- A repository of curated lists with elements such as IoCs to use for threat hunting & detection queries.☆33Jul 23, 2024Updated last year
- Threat Hunting & Incident Investigation with Osquery☆216Mar 30, 2022Updated 3 years ago
- Hunting Queries for Defender ATP☆83Dec 14, 2025Updated 2 months ago
- Executive coaching skill for planning your 2026 using research-backed process goals. Works with Claude Code and Claude.ai.☆28Jan 5, 2026Updated 2 months ago
- CloudPathSniffer is an open-source, easy to use and extensible Cloud Anomaly Detection platform designed to help security teams to find h…☆13Nov 30, 2023Updated 2 years ago
- A CVRF CSAF Converter, taking care about OASIS specification.☆10Jun 4, 2025Updated 9 months ago
- Installation tools for CircleCI Server - Static☆10Jan 14, 2023Updated 3 years ago
- Crossword client for Ubuntu☆10Sep 9, 2018Updated 7 years ago
- Script hecho en python, para sacar la IP, de las paginas web.☆11Aug 25, 2022Updated 3 years ago
- the fastest way to consume threat intelligence.☆30Mar 9, 2023Updated 3 years ago
- ☆77Jun 25, 2019Updated 6 years ago
- Tools, techniques, cheat sheets, and other resources to assist those defending organizations and detecting adversaries☆459Feb 4, 2022Updated 4 years ago
- ☆37May 13, 2020Updated 5 years ago
- Best practices in threat intelligence☆50Nov 6, 2022Updated 3 years ago
- ☆10Dec 17, 2022Updated 3 years ago
- A wireless infusion pump system workbench for security research☆15Jun 22, 2022Updated 3 years ago
- The frontend app of Mailcow's CowUI web interface☆12Apr 29, 2024Updated last year
- GitBucket Docker Image☆10Jul 17, 2024Updated last year
- PST Parser using pypff - Export all email headers and body to csv or json☆10Nov 8, 2019Updated 6 years ago
- Code samples of querying the API services of Whois XML Api.☆12Dec 14, 2023Updated 2 years ago
- Fast lookup server for NSRL and other hash database used in digital forensic☆48Jan 26, 2026Updated last month