detection-rulesThreat Detection & Anomaly Detection rules for popular open-source components
Stars: ✭ 34 (-86.97%)
Mutual labels: threat-hunting, threat-detection
PatrowlhearsPatrowlHears - Vulnerability Intelligence Center / Exploits
Stars: ✭ 89 (-65.9%)
Mutual labels: cybersecurity, threat-hunting
BesafeBeSafe is robust threat analyzer which help to protect your desktop environment and know what's happening around you
Stars: ✭ 21 (-91.95%)
Mutual labels: cybersecurity, threat-hunting
MispMISP (core software) - Open Source Threat Intelligence and Sharing Platform
Stars: ✭ 3,485 (+1235.25%)
Mutual labels: cybersecurity, threat-hunting
DomainCATDomain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations
Stars: ✭ 34 (-86.97%)
Mutual labels: cybersecurity, threat-hunting
WatcherWatcher - Open Source Cybersecurity Threat Hunting Platform. Developed with Django & React JS.
Stars: ✭ 324 (+24.14%)
Mutual labels: cybersecurity, threat-hunting
Ioc ExplorerExplore Indicators of Compromise Automatically
Stars: ✭ 73 (-72.03%)
Mutual labels: cybersecurity, threat-hunting
Malware FeedBringing you the best of the worst files on the Internet.
Stars: ✭ 69 (-73.56%)
Mutual labels: cybersecurity, threat-hunting
OwlyshieldOwlyshield is an EDR framework designed to safeguard vulnerable applications from potential exploitation (C&C, exfiltration and impact))..
Stars: ✭ 281 (+7.66%)
Mutual labels: cybersecurity, threat-hunting
OsweepDon't Just Search OSINT. Sweep It.
Stars: ✭ 225 (-13.79%)
Mutual labels: cybersecurity, threat-hunting
YAFRAYAFRA is a semi-automated framework for analyzing and representing reports about IT Security incidents.
Stars: ✭ 22 (-91.57%)
Mutual labels: cybersecurity, threat-hunting
Malware-Sample-SourcesMalware Sample Sources
Stars: ✭ 214 (-18.01%)
Mutual labels: cybersecurity, threat-hunting
AutonomousThreatSweepThreat Hunting queries for various attacks
Stars: ✭ 70 (-73.18%)
Mutual labels: cybersecurity, threat-hunting
Sentinel AttackTools to rapidly deploy a threat hunting capability on Azure Sentinel that leverages Sysmon and MITRE ATT&CK
Stars: ✭ 676 (+159%)
Mutual labels: cybersecurity, threat-hunting
Analyst ArsenalA toolkit for Security Researchers
Stars: ✭ 112 (-57.09%)
Mutual labels: cybersecurity, threat-hunting
thremulation-stationSmall-scale threat emulation and detection range built on Elastic and Atomic Redteam.
Stars: ✭ 28 (-89.27%)
Mutual labels: threat-hunting, threat-detection
censys-recon-ngrecon-ng modules for Censys
Stars: ✭ 29 (-88.89%)
Mutual labels: cybersecurity, threat-hunting
echoCTF.REDA platform to develop, run and administer CTF competitions. The online echoCTF.RED platform user interfaces and codebase
Stars: ✭ 33 (-87.36%)
Mutual labels: cybersecurity
firecrackerStop half-done API specifications! Cherrybomb is a CLI tool that helps you avoid undefined user behaviour by validating your API specifications.
Stars: ✭ 438 (+67.82%)
Mutual labels: cybersecurity
Threathunting-bookThreat hunting Web Windows AD linux ATT&CK TTPs
Stars: ✭ 338 (+29.5%)
Mutual labels: threat-hunting