Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for security threat hunting
security
x
threat-hunting
x
57 search results found
Misp
⭐
4,835
MISP (core software) - Open Source Threat Intelligence and Sharing Platform
Suricata
⭐
3,738
Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine developed by the OISF and the Suricata community.
Awesome Threat Detection
⭐
3,331
✨ A curated list of awesome threat detection and hunting resources 🕵️♂️
Securityonion
⭐
2,589
Security Onion is a free and open platform for threat hunting, enterprise security monitoring, and log management. It includes our own interfaces for alerting, dashboards, hunting, PCAP, and case management. It also includes other tools such as Playbook, osquery, CyberChef, Elasticsearch, Logstash, Kibana, Suricata, and Zeek.
Chainsaw
⭐
2,519
Rapidly Search and Hunt through Windows Forensic Artefacts
Apt_report
⭐
2,078
Interesting APT Report Collection And Some Special IOC
Hayabusa
⭐
1,800
Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.
Matano
⭐
1,259
Open source security data lake for threat hunting, detection & response, and cybersecurity analytics at petabyte scale on AWS
Beagle
⭐
1,171
Beagle is an incident response and digital forensics tool which transforms security logs and data into graphs.
Selks
⭐
1,120
A Suricata based IDS/IPS/NSM distro
Cyber Security
⭐
1,000
My cyber security tools
Bluespawn
⭐
912
An Active Defense and EDR software to empower Blue Teams
Hunting Queries Detection Rules
⭐
865
KQL Queries. Defender For Endpoint and Azure Sentinel Hunting and Detection Queries in KQL. Out of the box KQL queries for: Advanced Hunting, Custom Detection, Analytics Rules & Hunting Rules.
Watcher
⭐
795
Watcher - Open Source Cybersecurity Threat Hunting Platform. Developed with Django & React JS.
Fatt
⭐
622
FATT /fingerprintAllTheThings - a pyshark based script for extracting network metadata and fingerprints from pcap files and live network traffic
Tenzir
⭐
608
Open source security data pipelines.
Patrowlmanager
⭐
598
PatrOwl - Open Source, Smart and Scalable Security Operations Orchestration Platform
Scirius
⭐
552
Scirius is a web application for Suricata ruleset management and threat hunting.
Siem
⭐
489
SIEM Tactics, Techiques, and Procedures
Osquery Defense Kit
⭐
485
Production-ready detection & response queries for osquery
Meerkat
⭐
407
A collection of PowerShell modules designed for artifact gathering and reconnaisance of Windows-based endpoints.
Kql Threat Hunting Queries
⭐
287
A repository of KQL queries focused on threat hunting and threat detecting for Microsoft Sentinel & Microsoft XDR (Former Microsoft 365 Defender).
Openuba
⭐
264
A robust, and flexible open source User & Entity Behavior Analytics (UEBA) framework used for Security Analytics. Developed with luv by Data Scientists & Security Analysts from the Cyber Security Industry. [PRE-ALPHA]
Kestrel Lang
⭐
258
Kestrel threat hunting language: building reusable, composable, and shareable huntflows across different data sources and threat intel.
Patrowlengines
⭐
240
PatrOwl - Open Source, Free and Scalable Security Operations Orchestration Platform
Threatpinchlookup
⭐
236
Documentation and Sharing Repository for ThreatPinch Lookup Chrome & Firefox Extension
Adama
⭐
226
Searches For Threat Hunting and Security Analytics
Microsoft Sentinel Secops
⭐
211
Microsoft Sentinel SOC Operations
Stix Shifter
⭐
204
This project consists of an open source library allowing software to connect to data repositories using STIX Patterning, and return results as STIX Observations.
Epagneul
⭐
180
Graph Visualization for windows event logs
Bearded Avenger
⭐
176
CIF v3 -- the fastest way to consume threat intelligence
Phishingkithunter
⭐
157
Find phishing kits which use your brand/organization's files and image.
Docintel
⭐
133
Open Source Platform for storing, organizing, and searching documents related to cyber threats
Blue Teaming With Kql
⭐
125
Repository with Sample KQL Query examples for Threat Hunting
Infosec And Hacking Scripts
⭐
118
🚀 This is a collection of hacking🔥 and pentesting 🧐 scripts to help with enumeration, OSINT, exploitation and post exploitation automated scripts to make hacking easier🌠. Have fun!😎
Patrowldocs
⭐
118
PatrOwl - Open Source, Free and Scalable Security Operations Orchestration Platform
Purpleteam
⭐
106
Purpleteam scripts simulation & Detection - trigger events for SOC detections
Tylium
⭐
87
Primary data pipelines for intrusion detection, security analytics and threat hunting
Controlcompass.github.io
⭐
76
Pointing cybersecurity teams to thousands of detection rules and offensive security tests aligned with common attacker techniques
Advancedhuntingqueries
⭐
73
Microsoft 365 Advanced Hunting Queries with hotlinks that plug the query right into your tenant
Judge Jury And Executable
⭐
68
A file system forensics analysis scanner and threat hunting tool. Scans file systems at the MFT and OS level and stores data in SQL, SQLite or CSV. Threats and data can be probed harnessing the power and syntax of SQL.
Sqhunter
⭐
65
A simple threat hunting tool based on osquery, Salt Open and Cymon API
Secbert
⭐
61
pretrained BERT model for cyber security text, learned CyberSecurity Knowledge
Threat Hunting With Notebooks
⭐
47
Repository with Sample threat hunting notebooks on Security Event Log Data Sources
Rajappan
⭐
44
An All in one Project for Digital Privacy. A step towards a PRIVATE FUTURE
Remotemanagementmonitoringtools
⭐
42
Collection of Remote Management Monitoring tool artifacts, for assisting forensics and investigations
Rdfp
⭐
34
Remote Desktop Client Fingerprint script for Zeek. Based off of https://github.com/0x4D31/fatt
Csirtg Smrt V1
⭐
27
the fastest way to consume threat intelligence.
Thremulation Station
⭐
24
Small-scale threat emulation and detection range built on Elastic and Atomic Redteam.
Tigma
⭐
24
Sigma Engine implementation in TypeScript
Threat Intelligence Researches
⭐
17
The Brandefense cyber threat intelligence team is always researching new threats and writing research reports. Our latest Threat Reports is available for download. This reports covers the latest activity from APT groups, as well as new information on ransomware and phishing attacks. We recommend that all Brandefense followers download this reports and keep it handy in case they need to refer to it in the future.
Cti Stix Diamond Activity Attack Graph
⭐
17
STIX 2.1 Visualizer, Attack and Activity Thread Graph for Threat Modeling
Chad
⭐
17
Search Google Dorks like Chad. / Social media takeover tool.
Packages
⭐
13
Automated compromise detection of the world's most popular packages
Docker Cif
⭐
11
CIFv3 Ubuntu 16.04 Docker Container (Bearded Avenger)
Cybersecurity Threat Intelligence
⭐
10
An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and videos, Technical guidelines and important resources about Threat Intelligence.
Jamfprothreathunting
⭐
9
Scripts to aid intrusion and malware detection using the Jamf Agent and Jamf Server
Domain Extractor
⭐
8
Extract valid or partially valid domain names and IPs from malicious or invalid URLs.
Packettrail
⭐
5
Associates netflow data with system processes and logs to syslog
Related Searches
Security Vulnerabilities (12,295)
Laravel Security (11,580)
Php Security (10,653)
Python Security (3,208)
Html Security (2,241)
Golang Security (1,316)
Shell Security (1,158)
Security Penetration Testing (920)
C Security (828)
Amazon Web Services Security (795)
1-57 of 57 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.