Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for threat hunting
hunting
x
threat
x
57 search results found
Securityonion
⭐
2,589
Security Onion is a free and open platform for threat hunting, enterprise security monitoring, and log management. It includes our own interfaces for alerting, dashboards, hunting, PCAP, and case management. It also includes other tools such as Playbook, osquery, CyberChef, Elasticsearch, Logstash, Kibana, Suricata, and Zeek.
Malwoverview
⭐
2,492
Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, Malpedia, Malware Bazaar, ThreatFox, Triage, InQuest and it is able to scan Android devices against VT.
Hayabusa
⭐
1,800
Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.
Cyberthreathunting
⭐
755
A collection of resources for Threat Hunters - Sponsored by Falcon Guard
Threathunting
⭐
495
Tools for hunting for threats.
Wela
⭐
494
WELA (Windows Event Log Analyzer): The Swiss Army knife for Windows Event Logs! ゑ羅(ウェラ)
Mdatp
⭐
429
Microsoft Defender XDR - Resource Hub
Awesome_threat Hunting
⭐
311
A curated list of the most important and useful resources about Threat Detection,Hunting and Intelligence.
Adama
⭐
226
Searches For Threat Hunting and Security Analytics
Pshunt
⭐
185
Powershell Threat Hunting Module
Rastrea2r
⭐
173
Collecting & Hunting for IOCs with gusto and style
Hunter
⭐
170
A threat hunting / data analysis environment based on Python, Pandas, PySpark and Jupyter Notebook.
Oriana
⭐
136
Oriana is a threat hunting tool that leverages a subset of Windows events to build relationships, calculate totals and run analytics. The results are presented in a Web layer to help defenders identify outliers and suspicious behavior on corporate environments.
Blue Teaming With Kql
⭐
125
Repository with Sample KQL Query examples for Threat Hunting
Rthvm
⭐
101
Resolvn Threat Hunting Virtual Machine
Tylium
⭐
87
Primary data pipelines for intrusion detection, security analytics and threat hunting
Threathunt
⭐
70
ThreatHunt is a PowerShell repository that allows you to train your threat hunting skills.
Judge Jury And Executable
⭐
68
A file system forensics analysis scanner and threat hunting tool. Scans file systems at the MFT and OS level and stores data in SQL, SQLite or CSV. Threats and data can be probed harnessing the power and syntax of SQL.
Sigma Hunting App
⭐
63
A Splunk App containing Sigma detection rules, which can be updated from a Git repository.
Awsdetonationlab
⭐
60
This script is used to generate some basic detections of the aws security services
Phr Model
⭐
59
Prepare, Hunt, and Respond - Conceptual model against cyber attacks by JYVSECTEC
Threat Hunting With Notebooks
⭐
47
Repository with Sample threat hunting notebooks on Security Event Log Data Sources
Elk Hunting
⭐
39
Threat Hunting with ELK Workshop (InfoSecWorld 2017)
Winterfell Collection
⭐
39
Winterfell is a group of windows batch scripts to collect Windows forensics data and perform efficient, and fast incident response and threat hunting activities.
Conference Talks
⭐
37
Slides for my conference talks
Threat Hunting
⭐
34
This repo is dedicated to all my tricks, tweaks and modules for testing and hunting threats. This repo contains multiple directories which are in their own, different modules required for threat hunting. This repo will be updated as and when new changes are made.
Yara Scanner
⭐
34
YaraScanner is a file pattern-matching tool based on YARA rules.
Threat Hunting Samples
⭐
33
Three datasets to practice Threat Hunting against.
App_splunk_sysmon_hunter
⭐
33
Splunk App to assist Sysmon Threat Hunting
Threat Hunting Labs
⭐
32
Collection of walkthroughs on various threat hunting techniques
Threat_hunting_tables
⭐
31
Theat hunting notes in flat file format and mapped to MITRE's ATT&CK IDs
Threathuntingstuff
⭐
28
Useful Threat Hunting Stuff
Ioc_signatures
⭐
25
Repository with selected IOCs and YARA rules for threat hunting.
Kts6
⭐
19
Kibana 6 Templates for Suricata IDPS Threat Hunting
Advhuntingcheatsheet
⭐
18
Microsoft Threat Protection Advance Hunting Cheat Sheet
Threat Hunting Pocket Guide
⭐
16
pocket guide for core threat hunting concepts
Yara Rules
⭐
16
Repository of Yara rules created by the Stratosphere team
Baltar
⭐
16
Searches for Insider Threat Hunting
Threathunting
⭐
15
Powershell collection designed to assist in Threat Hunting Windows systems.
Elastalertgrouper
⭐
15
A feature extension to ease the automation of Threat Hunting with ElastAlert and the ELK Stack
Ps Srum Hunting
⭐
13
PowerShell Script to facilitate the processing of SRUM data for on-the-fly forensics and if needed threat hunting
Cyber Threat Hunting
⭐
12
Information about most important hunts which can be performed by Threat hunters while searching for any adversary/threats inside the organisation.
Resource Threat Hunting
⭐
12
Repository resource for threat hunter
Threathunting_with_osquery
⭐
11
Threat Hunting & Incident Investigation with Osquery
Threathunter Playbook
⭐
11
Sysmon Dfir
⭐
10
Sources, configuration and how to detect evil things utilizing Microsoft Sysmon.
Pastebinscrapy
⭐
10
Threat hunting tool for scraping latest scrapes from Pastebin
Misp Mvision Edr
⭐
9
Integration between MISP platform and McAfee MVISION EDR
Crowdstrike Falcon Queries
⭐
8
A collection of Splunk's Search Processing Language (SPL) for Threat Hunting with CrowdStrike Falcon
Threatplays
⭐
7
Sharing Threat Hunting runbooks
Cybersecurity Playground
⭐
6
CyberSecurity Resources (Threat Intelligence, Malware Analysis, Pentesting, DFIR, etc)
Threat Hunting Kiddie
⭐
6
Threat Hunting Kiddie compile the techniques and Indicator of Compromise (IoC) to perform the Compromise Assessment and Threat Hunting.
Politraf
⭐
5
Connections statistic for threat hunting, inventarization public services with vulners.
Opendxl Atd Mar Elasticsearch
⭐
5
Automated Real-Time Threat Hunting with ATD, Active Response and Elasticsearch/Kibana
Thethreathuntlibrary
⭐
5
Library of threat hunts to get any user started!
Infosec Resources
⭐
5
Plast
⭐
5
Modular command-line threat hunting tool & framework.
Related Searches
Python Threat (442)
Security Threat (258)
Malware Threat (134)
Python Hunting (116)
1-57 of 57 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.