Statistics for topic threat-hunting
RepositoryStats tracks 584,796 Github repositories, of these 176 are tagged with the threat-hunting topic. The most common primary language for repositories using this topic is Python (54). Other languages include: PowerShell (14)
Stargazers over time for topic threat-hunting
Most starred repositories for topic threat-hunting (view more)
Trending repositories for topic threat-hunting (view more)
Security Onion is a free and open platform for threat hunting, enterprise security monitoring, and log management. It includes our own interfaces for alerting, dashboards, hunting, PCAP, detections, a...
Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.
A curated list of annual cyber security reports
Rapidly Search and Hunt through Windows Forensic Artefacts
Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine developed by the OISF and the Suricata community.
A curated list of annual cyber security reports
Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis.
A resource containing all the tools each ransomware gangs uses
Security Onion is a free and open platform for threat hunting, enterprise security monitoring, and log management. It includes our own interfaces for alerting, dashboards, hunting, PCAP, detections, a...
Security Onion is a free and open platform for threat hunting, enterprise security monitoring, and log management. It includes our own interfaces for alerting, dashboards, hunting, PCAP, detections, a...
A resource containing all the tools each ransomware gangs uses
Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.
A curated list of annual cyber security reports
A curated list of annual cyber security reports
A resource containing all the tools each ransomware gangs uses
Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis.
A curated list of awesome malware persistence tools and resources.
Raw data from Threat Intelligence Reports with automatic reports collection and keyword search across thousands of reports
✨ A curated list of awesome threat detection and hunting resources 🕵️♂️
Rapidly Search and Hunt through Windows Forensic Artefacts
Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine developed by the OISF and the Suricata community.
Security Onion is a free and open platform for threat hunting, enterprise security monitoring, and log management. It includes our own interfaces for alerting, dashboards, hunting, PCAP, detections, a...
MISP (core software) - Open Source Threat Intelligence and Sharing Platform
ADXFlowmaster helps SecOps teams Threat Hunt suspicious network traffic inside & outside of Azure.
LOLESXi is a curated compilation of binaries/scripts available in VMware ESXi that are were used to by adversaries in their intrusions. This project gathers procedural examples from public reports of ...
Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis.
A curated list of annual cyber security reports
Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis.
Discover and track internet assets using favicon hashes through search engines.
LOLESXi is a curated compilation of binaries/scripts available in VMware ESXi that are were used to by adversaries in their intrusions. This project gathers procedural examples from public reports of ...
Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine developed by the OISF and the Suricata community.
✨ A curated list of awesome threat detection and hunting resources 🕵️♂️
Security Onion is a free and open platform for threat hunting, enterprise security monitoring, and log management. It includes our own interfaces for alerting, dashboards, hunting, PCAP, detections, a...
Domain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonation
yara detection rules for hunting with the threathunting-keywords project
A resource containing all the tools each ransomware gangs uses
Powershell script to help Speed up Threat hunting incident response processes