All Projects → Securonix → AutonomousThreatSweep

Securonix / AutonomousThreatSweep

Licence: other
Threat Hunting queries for various attacks

Projects that are alternatives of or similar to AutonomousThreatSweep

Malware Feed
Bringing you the best of the worst files on the Internet.
Stars: ✭ 69 (-1.43%)
Mutual labels:  cybersecurity, infosec, threat-hunting, threat-intelligence
Analyst Arsenal
A toolkit for Security Researchers
Stars: ✭ 112 (+60%)
Mutual labels:  cybersecurity, infosec, threat-hunting, threat-intelligence
Malware-Sample-Sources
Malware Sample Sources
Stars: ✭ 214 (+205.71%)
Mutual labels:  cybersecurity, infosec, threat-hunting, threat-intelligence
Spiderfoot
SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
Stars: ✭ 6,882 (+9731.43%)
Mutual labels:  cybersecurity, infosec, threat-intelligence
Stalkphish
StalkPhish - The Phishing kits stalker, harvesting phishing kits for investigations.
Stars: ✭ 256 (+265.71%)
Mutual labels:  infosec, threat-hunting, threat-intelligence
pyc2bytecode
A Python Bytecode Disassembler helping reverse engineers in dissecting Python binaries by disassembling and analyzing the compiled python byte-code(.pyc) files across all python versions (including Python 3.10.*)
Stars: ✭ 70 (+0%)
Mutual labels:  cybersecurity, infosec, threat-intelligence
YAFRA
YAFRA is a semi-automated framework for analyzing and representing reports about IT Security incidents.
Stars: ✭ 22 (-68.57%)
Mutual labels:  cybersecurity, threat-hunting, threat-intelligence
censys-recon-ng
recon-ng modules for Censys
Stars: ✭ 29 (-58.57%)
Mutual labels:  cybersecurity, threat-hunting, threat-intelligence
Misp
MISP (core software) - Open Source Threat Intelligence and Sharing Platform
Stars: ✭ 3,485 (+4878.57%)
Mutual labels:  cybersecurity, threat-hunting, threat-intelligence
MurMurHash
This little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform.
Stars: ✭ 79 (+12.86%)
Mutual labels:  cybersecurity, infosec, threat-intelligence
Ioc Explorer
Explore Indicators of Compromise Automatically
Stars: ✭ 73 (+4.29%)
Mutual labels:  cybersecurity, threat-hunting, threat-intelligence
Patrowlhears
PatrowlHears - Vulnerability Intelligence Center / Exploits
Stars: ✭ 89 (+27.14%)
Mutual labels:  cybersecurity, threat-hunting, threat-intelligence
Watcher
Watcher - Open Source Cybersecurity Threat Hunting Platform. Developed with Django & React JS.
Stars: ✭ 324 (+362.86%)
Mutual labels:  cybersecurity, threat-hunting, threat-intelligence
Besafe
BeSafe is robust threat analyzer which help to protect your desktop environment and know what's happening around you
Stars: ✭ 21 (-70%)
Mutual labels:  cybersecurity, threat-hunting, threat-intelligence
Chatter
internet monitoring osint telegram bot for windows
Stars: ✭ 123 (+75.71%)
Mutual labels:  cybersecurity, infosec, threat-intelligence
Osweep
Don't Just Search OSINT. Sweep It.
Stars: ✭ 225 (+221.43%)
Mutual labels:  cybersecurity, threat-hunting, threat-intelligence
Blue-Team-Notes
You didn't think I'd go and leave the blue team out, right?
Stars: ✭ 899 (+1184.29%)
Mutual labels:  cybersecurity, infosec
SuperLibrary
Information Security Library
Stars: ✭ 60 (-14.29%)
Mutual labels:  cybersecurity, infosec
SSHapendoes
Capture passwords of login attempts on non-existent and disabled accounts.
Stars: ✭ 31 (-55.71%)
Mutual labels:  threat-hunting, threat-intelligence
ThreatIntelligence
Tracking APT IOCs
Stars: ✭ 23 (-67.14%)
Mutual labels:  threat-hunting, threat-intelligence

The repository provides threat hunting queries for various threats/attacks that can be leveraged directly within the Securonix Snypr platform. For every attack there are two files -

  1. SpotterQueries.txt - The file contains spotter queries that can be executed directly in Snypr to hunt for the respective threats.
  2. References.txt - The file contains references/links to sources from where the threat intelligence was collected.
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].