Awesome Security lists for SOC/CERT/CTI
-
Updated
Jul 16, 2024 - Python
Awesome Security lists for SOC/CERT/CTI
Repository intended to allow users to leverage site fingerprints within their environments for threat detection and threat hunting
Automatically created C2 Feeds
IntelOwl: manage your Threat Intelligence at scale
Threat Hunting queries for various attacks
KQL Queries. Defender For Endpoint and Azure Sentinel Hunting and Detection Queries in KQL. Out of the box KQL queries for: Advanced Hunting, Custom Detection, Analytics Rules & Hunting Rules.
Sublime rules for email attack detection, prevention, and threat hunting.
Security Onion is a free and open platform for threat hunting, enterprise security monitoring, and log management. It includes our own interfaces for alerting, dashboards, hunting, PCAP, detections, and case management. It also includes other tools such as osquery, CyberChef, Elasticsearch, Logstash, Kibana, Suricata, and Zeek.
Simple Malware Scanner written in python
Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis.
Kestrel threat hunting language: building reusable, composable, and shareable huntflows across different data sources and threat intel.
Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine developed by the OISF and the Suricata community.
First Version of my website, Welcome aboard!
Threat-hunting tool for Linux
Import CrowdStrike Threat Intelligence into your instance of MISP
Your Everyday Threat Intelligence
Clusters and elements to attach to MISP events or attributes (like threat actors)
Updated Sigma2KQL script written by @CodeByHarri + Generating Analytics & Hunting Rules ready for Sentinel Deployment
Repositório criado com intuito de reunir informações, fontes(websites/portais) e tricks de OSINT dentro do contexto Brasil.
Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, Malpedia, Malware Bazaar, ThreatFox, Triage, InQuest and it is able to scan Android devices against VT.
Add a description, image, and links to the threat-hunting topic page so that developers can more easily learn about it.
To associate your repository with the threat-hunting topic, visit your repo's landing page and select "manage topics."