Threathunter Playbook

A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more efficient.
Alternatives To Threathunter Playbook
Project NameStarsDownloadsRepos Using ThisPackages Using ThisMost Recent CommitTotal ReleasesLatest ReleaseOpen IssuesLicenseLanguage
Threathunter Playbook3,497
8 days ago5mitPython
A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more efficient.
Hayabusa1,266
5 days ago29gpl-3.0Rust
Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.
Cyberthreathunting716
8 days agogpl-3.0Python
A collection of resources for Threat Hunters - Sponsored by Falcon Guard
Wela494
4 months ago10gpl-3.0PowerShell
WELA (Windows Event Log Analyzer): The Swiss Army knife for Windows Event Logs! ゑ羅(ウェラ)
Oriana136
4 years ago1bsd-3-clausePython
Oriana is a threat hunting tool that leverages a subset of Windows events to build relationships, calculate totals and run analytics. The results are presented in a Web layer to help defenders identify outliers and suspicious behavior on corporate environments.
Threathunt70
4 years ago2mitPowerShell
ThreatHunt is a PowerShell repository that allows you to train your threat hunting skills.
Threathunter Playbook11
6 years agomit
Threathunting_with_osquery11
2 years ago
Threat Hunting & Incident Investigation with Osquery
Forensibus3
10 days agogpl-3.0Go
Digital forensics and incident response ETL
Cybersecurity Playground1
3 years ago
CyberSecurity Resources (Threat Intelligence, Malware Analysis, Pentesting, DFIR, etc)
Alternatives To Threathunter Playbook
Select To Compare


Alternative Project Comparisons
Readme

The Threat Hunter Playbook

Binder License: MIT Twitter Open_Threat_Research Community Open Source Love

The Threat Hunter Playbook is a community-driven, open source project to share detection logic, adversary tradecraft and resources to make detection development more efficient. All the detection documents in this project follow the structure of MITRE ATT&CK categorizing post-compromise adversary behavior in tactical groups and are available in the form of interactive notebooks. The use of notebooks not only allow us to share text, queries and expected output, but also code to help others run detection logic against pre-recorded security datasets locally or remotely through BinderHub cloud computing environments.

Docs: https://threathunterplaybook.com/

Goals

  • Expedite the development of techniques an hypothesis for hunting campaigns.
  • Help security researchers understand patterns of behavior observed during post-exploitation.
  • Share resources to validate analytics locally or remotely through cloud computing environments for free.
  • Map pre-recorded datasets to adversarial techniques.
  • Accelerate infosec learning through open source resources.

Author

Roberto Rodriguez @Cyb3rWard0g

Official Committers

  • Jose Luis Rodriguez @Cyb3rPandaH is adding his expertise in data science to it.

Acknowledgements

Popular Hunting Projects
Popular Dfir Projects
Popular Security Categories
Related Searches

Get A Weekly Email With Trending Projects For These Categories
No Spam. Unsubscribe easily at any time.
Hunting
Dfir
Threat Hunting
Sysmon