Statistics for topic threat-hunting
RepositoryStats tracks 595,856 Github repositories, of these 178 are tagged with the threat-hunting topic. The most common primary language for repositories using this topic is Python (55). Other languages include: PowerShell (14)
Stargazers over time for topic threat-hunting
Most starred repositories for topic threat-hunting (view more)
Trending repositories for topic threat-hunting (view more)
✨ A curated list of awesome threat detection and hunting resources 🕵️♂️
M365/Azure adversary simulation tool that generates realistic attack telemetry to help blue teams improve their detection and response capabilities.
Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.
A curated list of annual cyber security reports
Security Onion is a free and open platform for threat hunting, enterprise security monitoring, and log management. It includes our own interfaces for alerting, dashboards, hunting, PCAP, detections, a...
A simple application that extracts your IoCs from garbage input and checks their reputation using multiple CTI services.
M365/Azure adversary simulation tool that generates realistic attack telemetry to help blue teams improve their detection and response capabilities.
A curated list of annual cyber security reports
A resource containing all the tools each ransomware gangs uses
This repo is about Active Directory Advanced Threat Hunting
M365/Azure adversary simulation tool that generates realistic attack telemetry to help blue teams improve their detection and response capabilities.
A simple application that extracts your IoCs from garbage input and checks their reputation using multiple CTI services.
✨ A curated list of awesome threat detection and hunting resources 🕵️♂️
A resource containing all the tools each ransomware gangs uses
Repository for threat hunting and detection queries, etc. for Defender for Endpoint and Microsoft Sentinel in KQL(Kusto Query Language).
A simple application that extracts your IoCs from garbage input and checks their reputation using multiple CTI services.
M365/Azure adversary simulation tool that generates realistic attack telemetry to help blue teams improve their detection and response capabilities.
A curated list of annual cyber security reports
A resource containing all the tools each ransomware gangs uses
Repository for threat hunting and detection queries, etc. for Defender for Endpoint and Microsoft Sentinel in KQL(Kusto Query Language).
M365/Azure adversary simulation tool that generates realistic attack telemetry to help blue teams improve their detection and response capabilities.
A resource containing all the tools each ransomware gangs uses
✨ A curated list of awesome threat detection and hunting resources 🕵️♂️
Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, Malpedia, Malware Bazaar, Threa...
Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine developed by the OISF and the Suricata community.
A simple application that extracts your IoCs from garbage input and checks their reputation using multiple CTI services.
M365/Azure adversary simulation tool that generates realistic attack telemetry to help blue teams improve their detection and response capabilities.
Raw data from Threat Intelligence Reports with automatic reports collection and keyword search across thousands of reports
A curated list of annual cyber security reports
A resource containing all the tools each ransomware gangs uses
Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis.
Discover and track internet assets using favicon hashes through search engines.
LOLESXi is a curated compilation of binaries/scripts available in VMware ESXi that are were used to by adversaries in their intrusions. This project gathers procedural examples from public reports of ...
Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine developed by the OISF and the Suricata community.
✨ A curated list of awesome threat detection and hunting resources 🕵️♂️
Security Onion is a free and open platform for threat hunting, enterprise security monitoring, and log management. It includes our own interfaces for alerting, dashboards, hunting, PCAP, detections, a...
A resource containing all the tools each ransomware gangs uses
A resource containing all the tools each ransomware gangs uses
yara detection rules for hunting with the threathunting-keywords project
LOLESXi is a curated compilation of binaries/scripts available in VMware ESXi that are were used to by adversaries in their intrusions. This project gathers procedural examples from public reports of ...
A curated list of annual cyber security reports