There are 11 repositories under threathunting topic.
IntelOwl: manage your Threat Intelligence at scale
Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, Malpedia, Malware Bazaar, ThreatFox, Triage, InQuest, VxExchange and IPInfo, and it is also able to scan Android devices against VT.
Threat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysis and hunting designed for intel and malware analysts as well as threat hunters to get up and running quickly.
Actionable analytics designed to combat threats
A Cloud Forensics Powershell module to run threat hunting playbooks on data from Azure and O365
KQL Queries. Microsoft Defender, Microsoft Sentinel
Awesome list of keywords and artifacts for Threat Hunting sessions
MDATP
A robust, and flexible open source User & Entity Behavior Analytics (UEBA) framework used for Security Analytics. Developed with luv by Data Scientists & Security Analysts from the Cyber Security Industry. [PRE-ALPHA]
Detecting ATT&CK techniques & tactics for Linux
Purpleteam scripts simulation & Detection - trigger events for SOC detections
An IDE and translation engine for detection engineers and threat hunters. Be faster, write smarter, keep 100% privacy.
This little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform.
Collection of Dashboards for Threat Hunting and more!
Sigma detection rules for hunting with the threathunting-keywords project
Library of threat hunts to get any user started!
Welcome to HackLab, your go-to resource for hands-on cybersecurity projects. This repository is a collection of step-by-step projects designed to enhance your understanding of various cybersecurity concepts, techniques, and tools.
Volatility MindMap & Cheat Sheet
Tiny proof-of-concept PowerShell script to do threat hunting using ChatGPT (text-davinci-003)
Detect leaks in security event logs.
Repository for SOC analysts, queries to investigate, advanced hunting, sites for analysis, malware samples, courses to improve skills, IOC and monitoring.
This is a simple Python script that connects to a MISP instance and retrieves attributes of specific types (such as IP addresses, URLs, and hashes). The retrieved attributes are then written to separate files.
Short deep dive into Threat Hunting on AWS
🏴☠️ BST is an ever-evolving collection of 🛠 tools to help in security and administration tasks 😉
Project to Support The Hunter's Framework (THF)
Lightweight Endpoint Detection & Response (EDR) Framework
A powershell tool that automate the remote forensic evidence adquisitions (triage) from Remote windows machines, using KAPE tool.
Pull your DS rules and build a ATT&CK matrix