threat-hunting
Here are 322 public repositories matching this topic...
Sysmon configuration file template with default high-quality event tracing
-
Updated
Feb 21, 2022
Domain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonation
-
Updated
Mar 2, 2022 - Python
The Hunting ELK
-
Updated
May 12, 2021 - Jupyter Notebook
A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more efficient.
-
Updated
Feb 19, 2022 - Python
Intel Owl: analyze files, domains, IPs in multiple ways from a single API at scale
-
Updated
Mar 30, 2022 - Python
A curated list of awesome threat detection and hunting resources
-
Updated
Mar 7, 2022
A curated list of awesome YARA rules, tools, and people.
-
Updated
Mar 17, 2022
I was wondering the benefit of using Modular File Management vs Single Config File Management? Why do you consider it easier to use multiple files and then compile? Trying to figure out what the best case is for my use case. Thanks. #
Signature base for my scanner tools
-
Updated
Mar 30, 2022 - YARA
Windows Events Attack Samples
-
Updated
Feb 19, 2022 - HTML
Real-time HTTP Intrusion Detection
-
Updated
Mar 24, 2022 - Go
Your Everyday Threat Intelligence
-
Updated
Mar 21, 2022 - Python
Utilities for Sysmon
-
Updated
Aug 11, 2021
Beagle is an incident response and digital forensics tool which transforms security logs and data into graphs.
-
Updated
Mar 15, 2022 - Python
An Active Defense and EDR software to empower Blue Teams
-
Updated
Feb 23, 2022 - C++
A Splunk app mapped to MITRE ATT&CK to guide your threat hunts
-
Updated
Nov 18, 2021
Tools to rapidly deploy a threat hunting capability on Azure Sentinel that leverages Sysmon and MITRE ATT&CK
-
Updated
Apr 27, 2021 - HCL
Curated Intelligence is working with analysts from around the world to provide useful information to organisations in Ukraine looking for additional free threat intelligence. Slava Ukraini. Glory to Ukraine.
-
Updated
Mar 30, 2022 - YARA
A Linux Auditd rule set mapped to MITRE's Attack Framework
-
Updated
Jul 8, 2020
APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the sea of windows event logs to decrease the time to uncover suspicious activity
-
Updated
Feb 9, 2022 - Python
Kaspersky's GReAT KLara
-
Updated
May 20, 2021 - PHP
A collection of resources for Threat Hunters - Sponsored by Falcon Guard
-
Updated
Feb 4, 2022 - Python
Watcher - Open Source Cybersecurity Threat Hunting Platform. Developed with Django & React JS.
-
Updated
Mar 27, 2022 - Python
Advanced Sysmon configuration, Installer & Auto Updater with high-quality event tracing
-
Updated
Feb 20, 2019 - Batchfile
A tool for OSINT based threat hunting
-
Updated
Mar 26, 2022 - HTML
Extract and aggregate threat intelligence.
-
Updated
Aug 3, 2021 - Python
A Cloud Forensics Powershell module to run threat hunting playbooks on data from Azure and O365
-
Updated
Jan 22, 2022 - PowerShell
Improve this page
Add a description, image, and links to the threat-hunting topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the threat-hunting topic, visit your repo's landing page and select "manage topics."


Problem in MISP/app/Lib/Export/NidsExport.php /
causes there are two rows in beggening of all rules regarding email. Bug is in row 161