Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for threat hunting
threat-hunting
x
260 search results found
Linux Exploit Detection
⭐
16
Linux based vulnerabilities (CVE) exploit detection through runtime security using Falco/Osquery/Yara/Sigma
Ir_scripts
⭐
15
incident response scripts
Firepit
⭐
15
Firepit - STIX Columnar Storage
Hanoman
⭐
15
Hanoman is an GUI antivirus engine singature based detection 🐒
Irma
⭐
15
enpoint detection / live analysis & sandbox host / signatures quality test
Syspce
⭐
15
System Processes Correlation Engine
Amphunt
⭐
15
Cisco AMP threat hunting scripts
Threathunting
⭐
15
Powershell collection designed to assist in Threat Hunting Windows systems.
Pyeti
⭐
15
Python bindings for Yeti's API
Csfalcon
⭐
14
crowdstrike tips & tricks 🦅 😶🌫️
Utilities
⭐
14
This repository contains tools used by 401trg.
Packages
⭐
13
Automated compromise detection of the world's most popular packages
Aws Threathunting
⭐
13
Projects for AWS ThreatHunting
Ps Srum Hunting
⭐
13
PowerShell Script to facilitate the processing of SRUM data for on-the-fly forensics and if needed threat hunting
Apullo
⭐
12
A scanner for taking basic fingerprints
Reports
⭐
12
Recent cyber attacks reports & interesting analysis files
Resource Threat Hunting
⭐
12
Repository resource for threat hunter
Apollon
⭐
12
Proof-of-Concept to evade auditd by writing /proc/PID/mem
File_watchtower
⭐
12
Lightweight File Integrity Monitoring Tool
Docker Cif
⭐
11
CIFv3 Ubuntu 16.04 Docker Container (Bearded Avenger)
Threathunting_with_osquery
⭐
11
Threat Hunting & Incident Investigation with Osquery
Iocdata
⭐
11
IoC Feed for security analysts etc.
Threatintelligence
⭐
10
Malicious IP source.
Hashlookup Gui
⭐
10
Provides a multi-platform Graphical User Interface for hashlookup
Pastebinscrapy
⭐
10
Threat hunting tool for scraping latest scrapes from Pastebin
Cybersecurity Threat Intelligence
⭐
10
An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and videos, Technical guidelines and important resources about Threat Intelligence.
Not Anti Virus
⭐
10
An attmept to block malware before AV scans it.
User_accounts_hunting
⭐
9
The scrip will help you to find some values info for the user that you need as DFIR
Jamfprothreathunting
⭐
9
Scripts to aid intrusion and malware detection using the Jamf Agent and Jamf Server
Spyglass
⭐
9
SpyGlass, the all in one tool for a kickass api.
Boxcar
⭐
9
Process the fortune 1000 domains to identify live typo-sites. Save results into a database for later processing and analysis.
Aisle25
⭐
9
Detect leaks in security event logs.
Deepglass
⭐
9
DEEPGLASS is a sysinternals-style tool designed to identify and collect potentially malicious files across a system
Context Graph Analytics
⭐
9
Time series knowledge graphs for cybersecurity
Go Intelowl
⭐
8
IntelOwl's client library/SDK in golang.
Crowdstrike Falcon Queries
⭐
8
A collection of Splunk's Search Processing Language (SPL) for Threat Hunting with CrowdStrike Falcon
Domain Extractor
⭐
8
Extract valid or partially valid domain names and IPs from malicious or invalid URLs.
Splunkdashboards
⭐
8
Collection of Dashboards for Threat Hunting and more!
Darkgate Install Script Via Dns Txt Record
⭐
7
PoC showcasing new DarkGate Install Script retrieval technique via DNS TXT Record
Bf Elk
⭐
7
Burnham Forensics ELK Deployment Files
Ioc Matching
⭐
7
IOC matching for incident responders, threat hunters, detection engineers, and security engineers.
Ail Feeder Leak
⭐
7
AIL LeakFeeder: A Module for AIL Framework that automate the process to feed leaked files automatically
Automation Sig Www
⭐
7
Automation SIG
Net Vulnerability
⭐
7
Check if your IPs, URLs or hosts are potentially malicious or infected.
Threatplays
⭐
7
Sharing Threat Hunting runbooks
Honeyshell
⭐
7
An SSH honeypot written entirely in Go.
Remotekapetriage
⭐
6
A powershell tool that automate the remote forensic evidence adquisitions (triage) from Remote windows machines, using KAPE tool.
Deepsecurity 2 Attck
⭐
6
Pull your DS rules and build a ATT&CK matrix
Interview Questions
⭐
6
A curated awesome list of lists of interview questions. Feel free to contribute!
Threat Hunting Kiddie
⭐
6
Threat Hunting Kiddie compile the techniques and Indicator of Compromise (IoC) to perform the Compromise Assessment and Threat Hunting.
Certthreat
⭐
5
CERT Transparency Log Monitoring for brand names and mailing domain names to detect phishing and brand impersonations
Plast
⭐
5
Modular command-line threat hunting tool & framework.
N3tstatids
⭐
5
Lightweight Endpoint Detection & Response (EDR) Framework
Anomy
⭐
5
Anomy is a Tor anonymiser to aid in Threat Intelligence and Malware Analysis Investigations.
Patternex Feed
⭐
5
PatternEx domain feed: malicious domains detected with AI
Yara Rules
⭐
5
This repository contains a list of known YARA rules which researchers can use according to their needs.The repository is opensource and can be used by the end users as long as they follow the GNU GENERAL PUBLIC LICENSE V3.
Dovehawk_dns
⭐
5
DoveHawk Passive DNS Collector Module for Zeek
Packettrail
⭐
5
Associates netflow data with system processes and logs to syslog
Thethreathuntlibrary
⭐
5
Library of threat hunts to get any user started!
Detections Podcast Detections
⭐
5
Detections podcast detections mapped to Mitre ATT&CK written in YAML
201-260 of 260 search results
< Previous
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.