Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for cybersecurity threat hunting
cybersecurity
x
threat-hunting
x
59 search results found
Misp
⭐
4,835
MISP (core software) - Open Source Threat Intelligence and Sharing Platform
Suricata
⭐
3,738
Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine developed by the OISF and the Suricata community.
Intelowl
⭐
2,995
IntelOwl: manage your Threat Intelligence at scale
Securityonion
⭐
2,589
Security Onion is a free and open platform for threat hunting, enterprise security monitoring, and log management. It includes our own interfaces for alerting, dashboards, hunting, PCAP, and case management. It also includes other tools such as Playbook, osquery, CyberChef, Elasticsearch, Logstash, Kibana, Suricata, and Zeek.
Malwoverview
⭐
2,492
Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, Malpedia, Malware Bazaar, ThreatFox, Triage, InQuest and it is able to scan Android devices against VT.
Apt_report
⭐
2,078
Interesting APT Report Collection And Some Special IOC
Hayabusa
⭐
1,800
Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.
Matano
⭐
1,259
Open source security data lake for threat hunting, detection & response, and cybersecurity analytics at petabyte scale on AWS
Sentinel Attack
⭐
1,038
Tools to rapidly deploy a threat hunting capability on Azure Sentinel that leverages Sysmon and MITRE ATT&CK
Cyber Security
⭐
1,000
My cyber security tools
Hunting Queries Detection Rules
⭐
865
KQL Queries. Defender For Endpoint and Azure Sentinel Hunting and Detection Queries in KQL. Out of the box KQL queries for: Advanced Hunting, Custom Detection, Analytics Rules & Hunting Rules.
Malware Exhibit
⭐
857
🚀🚀 This is a 🎇🔥 REAL WORLD🔥 🎇 Malware Collection I have Compiled & analysed by researchers🔥 to understand more about Malware threats😈, analysis and mitigation🧐.
Watcher
⭐
791
Watcher - Open Source Cybersecurity Threat Hunting Platform. Developed with Django & React JS.
Cyberthreathunting
⭐
755
A collection of resources for Threat Hunters - Sponsored by Falcon Guard
Azurehunter
⭐
626
A Cloud Forensics Powershell module to run threat hunting playbooks on data from Azure and O365
Opensquat
⭐
576
The openSquat project is an open-source solution for detecting phishing domains and domain squatting. It searches for newly registered domains that impersonate legitimate domains on a daily basis.
Scirius
⭐
552
Scirius is a web application for Suricata ruleset management and threat hunting.
Threat Hunting And Detection
⭐
509
Repository for threat hunting and detection queries, etc. for Defender for Endpoint and Microsoft Sentinel in KQL(Kusto Query Language).
Scrummage
⭐
448
The Ultimate OSINT and Threat Hunting Framework
Owlyshield
⭐
301
Owlyshield is an EDR framework designed to safeguard vulnerable applications from potential exploitation (C&C, exfiltration and impact).
Soc Multitool
⭐
286
A powerful and user-friendly browser extension that streamlines investigations for security professionals.
Openuba
⭐
264
A robust, and flexible open source User & Entity Behavior Analytics (UEBA) framework used for Security Analytics. Developed with luv by Data Scientists & Security Analysts from the Cyber Security Industry. [PRE-ALPHA]
Kestrel Lang
⭐
258
Kestrel threat hunting language: building reusable, composable, and shareable huntflows across different data sources and threat intel.
Osweep
⭐
237
Don't Just Search OSINT. Sweep It.
Malware Database
⭐
226
A large repository of malware samples with 2500+ malware samples & source codes for a variety of platforms by Cryptware Apps.
C2 Tracker
⭐
225
Live Feed of C2 servers, tools, and botnets
Stix Shifter
⭐
204
This project consists of an open source library allowing software to connect to data repositories using STIX Patterning, and return results as STIX Observations.
Patrowlhears
⭐
150
PatrowlHears - Vulnerability Intelligence Center / Exploits
Rita J
⭐
134
Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.
Docintel
⭐
133
Open Source Platform for storing, organizing, and searching documents related to cyber threats
Infosec And Hacking Scripts
⭐
118
🚀 This is a collection of hacking🔥 and pentesting 🧐 scripts to help with enumeration, OSINT, exploitation and post exploitation automated scripts to make hacking easier🌠. Have fun!😎
Analyst Arsenal
⭐
114
A toolkit for Security Researchers
Murmurhash
⭐
101
This little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform.
Posint
⭐
95
Gather Open-Source Intelligence using PowerShell.
Malware Feed
⭐
82
Bringing you the best of the worst files on the Internet.
Aimod2
⭐
77
Adversarial Interception Mission Oriented Discovery and Disruption Framework, or AIMOD2, is a structured threat hunting approach to proactively identify, engage and prevent cyber threats denying or mitigating potential damage to the organization.
Controlcompass.github.io
⭐
76
Pointing cybersecurity teams to thousands of detection rules and offensive security tests aligned with common attacker techniques
Advancedhuntingqueries
⭐
73
Microsoft 365 Advanced Hunting Queries with hotlinks that plug the query right into your tenant
Awesome Annual Security Reports
⭐
70
A curated list of annual cyber security reports
Ioc Explorer
⭐
66
Explore Indicators of Compromise Automatically
Secbert
⭐
61
pretrained BERT model for cyber security text, learned CyberSecurity Knowledge
Rajappan
⭐
44
An All in one Project for Digital Privacy. A step towards a PRIVATE FUTURE
Censys Recon Ng
⭐
36
recon-ng modules for Censys
Malware Sample Sources
⭐
27
Malware Sample Sources
Domaincat
⭐
26
Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations
Cybersecurity Threat Detection
⭐
18
An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and videos, Technical guidelines and important resources about Threat Detection & Hunting.
Domainthreat
⭐
17
Daily Domain Monitoring to detect phishing and brand impersonation with subdomain enumeration and source code scraping
Threat Intelligence Researches
⭐
17
The Brandefense cyber threat intelligence team is always researching new threats and writing research reports. Our latest Threat Reports is available for download. This reports covers the latest activity from APT groups, as well as new information on ransomware and phishing attacks. We recommend that all Brandefense followers download this reports and keep it handy in case they need to refer to it in the future.
Cti Stix Diamond Activity Attack Graph
⭐
17
STIX 2.1 Visualizer, Attack and Activity Thread Graph for Threat Modeling
Yafra
⭐
16
YAFRA is a semi-automated framework for analyzing and representing reports about IT Security incidents.
Threathunting_with_osquery
⭐
11
Threat Hunting & Incident Investigation with Osquery
Threatintelligence
⭐
10
Malicious IP source.
Cybersecurity Threat Intelligence
⭐
10
An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and videos, Technical guidelines and important resources about Threat Intelligence.
Deepglass
⭐
9
DEEPGLASS is a sysinternals-style tool designed to identify and collect potentially malicious files across a system
Context Graph Analytics
⭐
9
Time series knowledge graphs for cybersecurity
Automation Sig Www
⭐
7
Automation SIG
Net Vulnerability
⭐
7
Check if your IPs, URLs or hosts are potentially malicious or infected.
Ail Feeder Leak
⭐
7
AIL LeakFeeder: A Module for AIL Framework that automate the process to feed leaked files automatically
Honeyshell
⭐
7
An SSH honeypot written entirely in Go.
Darkgate Install Script Via Dns Txt Record
⭐
7
PoC showcasing new DarkGate Install Script retrieval technique via DNS TXT Record
Ioc Matching
⭐
7
IOC matching for incident responders, threat hunters, detection engineers, and security engineers.
Interview Questions
⭐
6
A curated awesome list of lists of interview questions. Feel free to contribute!
Remotekapetriage
⭐
6
A powershell tool that automate the remote forensic evidence adquisitions (triage) from Remote windows machines, using KAPE tool.
Yara Rules
⭐
5
This repository contains a list of known YARA rules which researchers can use according to their needs.The repository is opensource and can be used by the end users as long as they follow the GNU GENERAL PUBLIC LICENSE V3.
Thethreathuntlibrary
⭐
5
Library of threat hunts to get any user started!
Certthreat
⭐
5
CERT Transparency Log Monitoring for brand names and mailing domain names to detect phishing and brand impersonations
Related Searches
Python Cybersecurity (793)
Security Cybersecurity (508)
Cybersecurity Information Security (236)
Cybersecurity Security Tools (157)
Javascript Cybersecurity (132)
1-59 of 59 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.