Statistics for topic threat-hunting
RepositoryStats tracks 518,991 Github repositories, of these 165 are tagged with the threat-hunting topic. The most common primary language for repositories using this topic is Python (53). Other languages include: PowerShell (11)
Stargazers over time for topic threat-hunting
Most starred repositories for topic threat-hunting (view more)
Trending repositories for topic threat-hunting (view more)
✨ A curated list of awesome threat detection and hunting resources 🕵️♂️
MISP (core software) - Open Source Threat Intelligence and Sharing Platform
Security Onion is a free and open platform for threat hunting, enterprise security monitoring, and log management. It includes our own interfaces for alerting, dashboards, hunting, PCAP, and case mana...
M365/Azure adversary simulation tool designed to simulate adversary techniques and generate attack telemetry.
Collection of Remote Management Monitoring tool artifacts, for assisting forensics and investigations
A curated list of annual cyber security reports
Cover various security approaches to attack techniques and also provides new discoveries about security breaches.
Collection of malware persistence and hunting information. Be a persistent persistence hunter!
✨ A curated list of awesome threat detection and hunting resources 🕵️♂️
Domain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonation
Clusters and elements to attach to MISP events or attributes (like threat actors)
Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.
Security Onion is a free and open platform for threat hunting, enterprise security monitoring, and log management. It includes our own interfaces for alerting, dashboards, hunting, PCAP, and case mana...
yara detection rules for hunting with the threathunting-keywords project
Cover various security approaches to attack techniques and also provides new discoveries about security breaches.
M365/Azure adversary simulation tool designed to simulate adversary techniques and generate attack telemetry.
Clusters and elements to attach to MISP events or attributes (like threat actors)
A curated list of annual cyber security reports
Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine developed by the OISF and the Suricata community.
Security Onion is a free and open platform for threat hunting, enterprise security monitoring, and log management. It includes our own interfaces for alerting, dashboards, hunting, PCAP, and case mana...
Domain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonation
A repository of KQL queries focused on threat hunting and threat detecting for Microsoft Sentinel & Microsoft XDR (Former Microsoft 365 Defender).
Newly registered Domain Monitoring to detect phishing and brand impersonation with subdomain enumeration and source code scraping
A curated list of annual cyber security reports
M365/Azure adversary simulation tool designed to simulate adversary techniques and generate attack telemetry.
yara detection rules for hunting with the threathunting-keywords project
A suite for hunting suspicious targets, expose domains and phishing discovery
M365/Azure adversary simulation tool designed to simulate adversary techniques and generate attack telemetry.
Security Onion is a free and open platform for threat hunting, enterprise security monitoring, and log management. It includes our own interfaces for alerting, dashboards, hunting, PCAP, and case mana...
Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine developed by the OISF and the Suricata community.
Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.
MISP (core software) - Open Source Threat Intelligence and Sharing Platform
✨ A curated list of awesome threat detection and hunting resources 🕵️♂️
Cover various security approaches to attack techniques and also provides new discoveries about security breaches.
Awesome list of keywords and artifacts for Threat Hunting sessions
A repository of KQL queries focused on threat hunting and threat detecting for Microsoft Sentinel & Microsoft XDR (Former Microsoft 365 Defender).
This repository contains Open Source freely usable Threat Intel feeds that can be used without additional requirements. Contains multiple types such as IP, URL, CVE and Hash.