| Yamato-Security/hayabusa |
1,800 |
|
0 |
0 |
about 2 years ago |
0 |
|
33 |
gpl-3.0 |
Rust |
| Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs. |
| A3sal0n/CyberThreatHunting |
755 |
|
0 |
0 |
over 2 years ago |
0 |
|
0 |
gpl-3.0 |
Python |
| A collection of resources for Threat Hunters - Sponsored by Falcon Guard |
| eshlomo1/Microsoft-Sentinel-SecOps |
266 |
|
0 |
0 |
almost 2 years ago |
0 |
|
0 |
mit |
PowerShell |
| Microsoft Sentinel SOC Operations |
| mvelazc0/Oriana |
136 |
|
0 |
0 |
over 6 years ago |
0 |
|
1 |
bsd-3-clause |
Python |
| Oriana is a threat hunting tool that leverages a subset of Windows events to build relationships, calculate totals and run analytics. The results are presented in a Web layer to help defenders identify outliers and suspicious behavior on corporate environments. |
| MiladMSFT/ThreatHunt |
70 |
|
0 |
0 |
over 6 years ago |
0 |
|
2 |
mit |
PowerShell |
| ThreatHunt is a PowerShell repository that allows you to train your threat hunting skills. |
| yasser-alghamdi/winterfell-collection |
39 |
|
0 |
0 |
over 5 years ago |
0 |
|
0 |
|
Batchfile |
| Winterfell is a group of windows batch scripts to collect Windows forensics data and perform efficient, and fast incident response and threat hunting activities. |
| emrekybs/Douglas-042 |
26 |
|
0 |
0 |
over 2 years ago |
0 |
|
0 |
mit |
PowerShell |
| Powershell script to help Speed up Threat hunting incident response processes |
| mthcht/ThreatHunting-Keywords-yara-rules |
17 |
|
0 |
0 |
about 2 years ago |
0 |
|
0 |
|
YARA |
| yara detection rules for hunting with the threathunting-keywords project |
| Kirtar22/ThreatHunting_with_Osquery |
11 |
|
0 |
0 |
over 5 years ago |
0 |
|
0 |
|
|
| Threat Hunting & Incident Investigation with Osquery |
| bobbystacksmash/CMD-DeObfuscator |
10 |
|
0 |
0 |
almost 7 years ago |
0 |
|
2 |
bsd-3-clause |
JavaScript |
| A Node.js module for deobfuscating and expanding DOS/BATCH commands. |