awesome-threat-detection

✨ A curated list of awesome threat detection and hunting resources 🕵️‍♂️

GitHub

4k stars
191 watching
639 forks
last commit: 3 months ago
Linked from 4 awesome lists

awesomeawesome-listdetectionincident-responsesecuritythreat-detectionthreat-hunting

Awesome Threat Detection and Hunting / Tools

MITRE ATT&CK Navigator ( ) - The ATT&CK Navigator is designed to provide basic navigation and annotation of ATT&CK matrices, something that people are already doing today in tools like Excel
HELK 3,749 4 months ago A Hunting ELK (Elasticsearch, Logstash, Kibana) with advanced analytic capabilities
DetectionLab 4,615 3 months ago Vagrant & Packer scripts to build a lab environment complete with security tooling and logging best practices
Revoke-Obfuscation 721 10 months ago PowerShell Obfuscation Detection Framework
Invoke-ATTACKAPI 365 over 5 years ago A PowerShell script to interact with the MITRE ATT&CK Framework via its own API
Unfetter 177 over 5 years ago A reference implementation provides a framework for collecting events (process creation, network connections, Window Event Logs, etc.) from a client machine and performing CAR analytics to detect potential adversary activity
Flare 442 almost 2 years ago An analytical framework for network traffic and behavioral analytics
RedHunt-OS 1,239 about 4 years ago A Virtual Machine for Adversary Emulation and Threat Hunting. RedHunt aims to be a one stop shop for all your threat emulation and threat hunting needs by integrating attacker's arsenal as well as defender's toolkit to actively identify the threats in your environment
Oriana 176 over 3 years ago Lateral movement and threat hunting tool for Windows environments built on Django comes Docker ready
Bro-Osquery 15 over 1 year ago Bro integration with osquery
Brosquery 28 over 9 years ago A module for osquery to load Bro logs into tables
DeepBlueCLI 2,162 12 months ago A PowerShell Module for Hunt Teaming via Windows Event Logs
Uncoder An online translator for SIEM saved searches, filters, queries, API requests, correlation and Sigma rules
CimSweep 640 about 5 years ago A suite of CIM/WMI-based tools that enable the ability to perform incident response and hunting operations remotely across all versions of Windows
Dispatch 4,983 5 days ago An open-source crisis management orchestration framework
EQL 218 11 months ago Event Query Language

Awesome Threat Detection and Hunting / Tools / EQL

EQLLib 158 over 3 years ago The Event Query Language Analytics Library (eqllib) is a library of event based analytics, written in EQL to detect adversary behaviors identified in MITRE ATT&CK™

Awesome Threat Detection and Hunting / Tools

BZAR 554 3 months ago (Bro/Zeek ATT&CK-based Analytics and Reporting) - A set of Zeek scripts to detect ATT&CK techniques
Security Onion 3,064 over 3 years ago An open-source Linux distribution for threat hunting, security monitoring, and log management. It includes ELK, Snort, Suricata, Zeek, Wazuh, Sguil, and many other security tools
Varna 51 almost 2 years ago A quick & cheap AWS CloudTrail Monitoring with Event Query Language (EQL)
BinaryAlert 1,405 10 months ago Serverless, real-time & retroactive malware detection
hollows_hunter 2,008 11 days ago Scans all running processes, recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks, in-memory patches)
ThreatHunting 1,129 about 1 year ago A Splunk app mapped to MITRE ATT&CK to guide your threat hunts
Sentinel Attack 1,053 about 1 year ago A repository of Azure Sentinel alerts and hunting queries leveraging sysmon and the MITRE ATT&CK framework
Brim 1,787 5 days ago A desktop application to efficiently search large packet captures and Zeek logs
YARA 8,173 10 days ago The pattern matching swiss knife
Intel Owl 3,784 8 days ago An Open Source Intelligence, or OSINT solution to get threat intelligence data about a specific file, an IP or a domain from a single API at scale
Capa 4,127 5 days ago An open-source tool to identify capabilities in executable files
Splunk Security Content 1,258 8 days ago Splunk-curated detection content that can easily be used accross many SIEMs (see Uncoder Rule Converter.)
Threat Bus 256 over 1 year ago Threat intelligence dissemination layer to connect security tools through a distributed publish/subscribe message broker
VAST 638 5 days ago A network telemetry engine for data-driven security investigations
zeek2es 33 about 2 years ago An open source tool to convert Zeek logs to Elastic/OpenSearch. You can also output pure JSON from Zeek's TSV logs!
LogSlash 184 about 1 year ago : A standard for reducing log volume without sacrificing analytical capability
SOC-Multitool 331 about 2 months ago : A powerful and user-friendly browser extension that streamlines investigations for security professionals
Zeek Analysis Tools (ZAT) 424 9 months ago : Processing and analysis of Zeek network data with Pandas, scikit-learn, Kafka and Spark
ProcMon for Linux 3,978 2 months ago
Synthetic Adversarial Log Objects (SALO) 77 9 months ago A framework for the generation of log events without the need for infrastructure or actions to initiate the event that causes a log event

Awesome Threat Detection and Hunting / Tools / Detection, Alerting and Automation Platforms

ElastAlert 7,991 about 2 months ago A framework for alerting on anomalies, spikes, or other patterns of interest from data in Elasticsearch
StreamAlert 2,854 12 months ago A serverless, realtime data analysis framework which empowers you to ingest, analyze, and alert on data from any environment, using datasources and alerting logic you define
Matano 1,453 3 months ago : An open source security lake platform (SIEM alternative) for threat hunting, detection and response on AWS. Matano lets you write advanced detections as code (using python) to correlate and alert on threats in realtime
Shuffle 1,690 11 days ago : A general purpose security automation platform
Sublime 163 about 1 month ago : An open platform for detection, response, and threat hunting in email environments. Sublime lets you write advanced detections as code to alert and remediate threats like phishing in real-time
Substation 321 8 days ago A cloud native data pipeline and transformation toolkit for security teams

Awesome Threat Detection and Hunting / Tools / Endpoint Monitoring

osquery ( ) - SQL powered operating system instrumentation, monitoring, and analytics
Kolide Fleet 1,102 almost 4 years ago A flexible control server for osquery fleets
Zeek Agent 125 almost 4 years ago An endpoint monitoring agent that provides host activity to Zeek
Velociraptor 2,906 5 days ago Endpoint visibility and collection tool
Sysdig 7,732 12 days ago A tool for deep Linux system visibility, with native support for containers. Think about sysdig as strace + tcpdump + htop + iftop + lsof + ...awesome sauce
go-audit 1,571 about 1 month ago An alternative to the Linux auditd daemon
Sysmon A Windows system service and device driver that monitors and logs system activity to the Windows event log
Sysmon for Linux 1,727 4 months ago
OSSEC 4,431 4 months ago An open-source Host-based Intrusion Detection System (HIDS)
WAZUH 10,509 5 days ago An open-source security platform
sysmon-DFIR 897 10 months ago Sources, configuration and how to detect evil things utilizing Microsoft Sysmon
sysmon-config 4,755 3 months ago Sysmon configuration file template with default high-quality event tracing
sysmon-modular 2,632 about 2 months ago A repository of sysmon configuration modules. It also includes a of Sysmon configurations to MITRE ATT&CK techniques
auditd configuration 1,476 3 months ago
osquery-configuration 816 about 2 years ago A repository for using osquery for incident detection and response

Awesome Threat Detection and Hunting / Tools / Network Monitoring

Zeek 6,378 5 days ago (formerly Bro) - A network security monitoring tool
ntopng 6,199 8 days ago A web-based network traffic monitoring tool
Suricata A network threat detection engine
Snort ( ) - A network intrusion detection tool
Joy 1,301 6 months ago A package for capturing and analyzing network flow data and intraflow data, for network research, forensics, and security monitoring
Netcap 1,721 12 months ago A framework for secure and scalable network traffic analysis
Moloch 6,286 12 days ago A large scale and open source full packet capture and search tool
Stenographer 1,788 about 3 years ago A full-packet-capture tool
JA3 2,685 12 months ago A method for profiling SSL/TLS Clients and Servers
HASSH 530 7 months ago Profiling Method for SSH Clients and Servers
RDFP 37 over 1 year ago Zeek Remote desktop fingerprinting script based on (Fingerprint All The Things)
FATT 651 11 months ago A pyshark based script for extracting network metadata and fingerprints from pcap files and live network traffic
FingerprinTLS 375 almost 4 years ago A TLS fingerprinting method
Mercury 437 about 1 month ago Network fingerprinting and packet metadata capture
GQUIC Protocol Analyzer for Zeek 76 about 1 year ago
Recog 664 12 days ago A framework for identifying products, services, operating systems, and hardware by matching fingerprints against data returned from various network probes
Hfinger 128 over 1 year ago Fingerprinting HTTP requests
JARM 1,158 about 1 year ago An active Transport Layer Security (TLS) server fingerprinting tool

Awesome Threat Detection and Hunting / Tools / Email Monitoring

Sublime Platform 163 about 1 month ago An email threat detection engine

Awesome Threat Detection and Hunting / Detection Rules

Sigma 8,151 13 days ago Generic Signature Format for SIEM Systems
Splunk Detections and
Elastic Detection Rules 1,911 7 days ago
MITRE CAR The Cyber Analytics Repository is a knowledge base of analytics developed by MITRE based on the Adversary Tactics, Techniques, and Common Knowledge (ATT&CK™) adversary model
Awesome YARA Rules 3,503 about 1 month ago
Chronicle Detection Rules 302 12 days ago Collection of YARA-L 2.0 sample rules for the Chronicle Detection API
GCP Security Analytics 319 4 months ago Community Security Analytics provides a set of community-driven audit & threat queries for Google Cloud
ThreatHunter-Playbook 3,988 8 months ago A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more efficient
Sublime Detection Rules 237 5 days ago Email attack detection, response, and hunting rules

Awesome Threat Detection and Hunting / Dataset

Mordor 1,588 7 months ago Pre-recorded security events generated by simulated adversarial techniques in the form of JavaScript Object Notation (JSON) files. The data is categorized by platforms, adversary groups, tactics and techniques defined by the Mitre ATT&CK Framework
SecRepo.com ( ) - Samples of security related data
Boss of the SOC (BOTS) Dataset Version 1 358 about 2 months ago
Boss of the SOC (BOTS) Dataset Version 2 355 almost 2 years ago
Boss of the SOC (BOTS) Dataset Version 3 275 over 4 years ago
EMBER 934 about 2 months ago ( ) - The EMBER dataset is a collection of features from PE files that serve as a benchmark dataset for researchers
theZoo 11,186 5 months ago A repository of LIVE malwares
CIC Datasets Canadian Institute for Cybersecurity datasets
Netresec's PCAP repo list A list of public packet capture repositories, which are freely available on the Internet
PCAP-ATTACK 342 over 3 years ago A repo of PCAP samples for different ATT&CK techniques
EVTX-ATTACK-SAMPLES 2,210 over 1 year ago A repo of Windows event samples (EVTX) associated with ATT&CK techniques ( )
Public Security Log Sharing Site
attack_data 570 19 days ago A repository of curated datasets from various attacks

Awesome Threat Detection and Hunting / Resources

Huntpedia Your Threat Hunting Knowledge Compendium
Hunt Evil Your Practical Guide to Threat Hunting
The Hunter's Handbook Endgame's guide to adversary hunting
ThreatHunter-Playbook 3,988 8 months ago A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns
The ThreatHunting Project 1,702 almost 3 years ago A great and threat hunting resources
CyberThreatHunting 848 3 months ago A collection of resources for threat hunters
Hunt-Detect-Prevent 159 almost 6 years ago Lists of sources and utilities to hunt, detect and prevent evildoers
Alerting and Detection Strategy Framework
Generating Hypotheses for Successful Threat Hunting
Expert Investigation Guide - Threat Hunting 50 over 3 years ago
Active Directory Threat Hunting
Threat Hunting for Fileless Malware
Windows Commands Abused by Attackers
Deception-as-Detection 284 almost 7 years ago Deception based detection techniques mapped to the MITRE’s ATT&CK framework
On TTPs
Slides Hunting On The Cheap ( )
Threat Hunting Techniques - AV, Proxy, DNS and HTTP Logs
Detecting Malware Beacons Using Splunk
Data Science Hunting Funnel
Use Python & Pandas to Create a D3 Force Directed Network Diagram
Syscall Auditing at Scale
Catching attackers with go-audit and a logging pipeline
The Coventry Conundrum of Threat Intelligence
Signal the ATT&CK: Part 1 Building a real-time threat detection capability with Tanium that focuses on documented adversarial techniques
DFIR SANS Summit Archives ( , ) - Threat hunting, Blue Team and DFIR summit slides
Bro-Osquery Large-Scale Host and Network Monitoring Using Open-Source Software
Malware Persistence 164 about 1 month ago Collection of various information focused on malware persistence: detection (techniques), response, pitfalls and the log collection (tools)
Threat Hunting with Jupyter Notebooks
How Dropbox Security builds tools for threat detection and incident response
Introducing Event Query Language
The No Hassle Guide to Event Query Language (EQL) for Threat Hunting ( )
Introducing the Funnel of Fidelity ( )
Detection Spectrum ( )
Capability Abstraction ( )
Awesome YARA 3,503 about 1 month ago A curated list of awesome YARA rules, tools, and resources
Defining ATT&CK Data Sources A two-part blog series that outlines a new methodology to extend ATT&CK’s current data sources
DETT&CT: MAPPING YOUR BLUE TEAM TO MITRE ATT&CK™ A blog that describes how to align MITRE ATT&CK-based detection content with data sources
Part 1, Detection as Code in Splunk - A multipart series describing how detection as code can be successfully deployed in a Splunk environment
Lessons Learned in Detection Engineering A well experienced detection engineer describes in detail his observations, challenges, and recommendations for building an effective threat detection program
A Research-Driven process applied to Threat Detection Engineering Inputs
Investigation Scenario tweets by Chris Sanders
Oh My Malware A video series focused on malware execution and investigations using Elastic Security

Awesome Threat Detection and Hunting / Resources / Frameworks

MITRE ATT&CK A curated knowledge base and model for cyber adversary behavior, reflecting the various phases of an adversary’s lifecycle and the platforms they are known to target
Alerting and Detection Strategies Framework 662 almost 3 years ago A framework for developing alerting and detection strategies
A Simple Hunting Maturity Model The Hunting Maturity Model describes five levels of organizational hunting capability, ranging from HMM0 (the least capability) to HMM4 (the most)
The Pyramic of Pain The relationship between the types of indicators you might use to detect an adversary's activities and how much pain it will cause them when you are able to deny those indicators to them
A Framework for Cyber Threat Hunting
The PARIS Model A model for threat hunting
Cyber Kill Chain It is part of the Intelligence Driven Defense® model for identification and prevention of cyber intrusions activity. The model identifies what the adversaries must complete in order to achieve their objective
The DML Model The Detection Maturity Level (DML) model is a capability maturity model for referencing ones maturity in detecting cyber attacks
NIST Cybersecurity Framework
OSSEM 1,231 over 1 year ago (Open Source Security Events Metadata) - A community-led project that focuses on the documentation and standardization of security event logs from diverse data sources and operating systems
Open Cybersecurity Schema Framework (OCSF) 614 8 days ago A framework for creating schemas and it also delivers a cybersecurity event schema built with the framework ( )
MITRE Engage A framework for planning and discussing adversary engagement operations that empowers you to engage your adversaries and achieve your cybersecurity goals
MaGMa Use Case Defintion Model A business-centric approach for planning and defining threat detection use cases

Awesome Threat Detection and Hunting / Resources / Windows

Threat Hunting via Windows Event Logs
Windows Logging Cheat Sheets
Active Directory Threat Hunting
Windows Hunting 345 over 3 years ago A collection of Windows hunting queries
Windows Commands Abused by Attackers
JPCERT - Detecting Lateral Movement through Tracking Event Logs

Awesome Threat Detection and Hunting / Resources / Windows / JPCERT - Detecting Lateral Movement through Tracking Event Logs

Tool Analysis Result Sheet

Awesome Threat Detection and Hunting / Resources / Windows

Splunking the Endpoint: Threat Hunting with Sysmon

Awesome Threat Detection and Hunting / Resources / Windows / Splunking the Endpoint: Threat Hunting with Sysmon

Hunting with Sysmon

Awesome Threat Detection and Hunting / Resources / Windows

Threat Hunting with Sysmon: Word Document with Macro

Awesome Threat Detection and Hunting / Resources / Windows / Chronicles of a Threat Hunter: Hunting for In-Memory Mimikatz with Sysmon and ELK

Part I (Event ID 7)
Part II (Event ID 10)

Awesome Threat Detection and Hunting / Resources / Windows

botconf 2016 Slides Advanced Incident Detection and Threat Hunting using Sysmon (and Splunk) ( , )
The Sysmon and Threat Hunting Mimikatz wiki for the blue team
Splunkmon — Taking Sysmon to the Next Level
Sysmon Threat Detection Guide ( )
Paper Revoke-Obfuscation: PowerShell Obfuscation Detection Using Science ( , )
Hunting the Known Unknowns (With PowerShell)
HellsBells, Let's Hunt PowerShells!
Hunting for PowerShell Using Heatmaps

Awesome Threat Detection and Hunting / Resources / MacOS

A Guide to macOS Threat Hunting and Incident Response

Awesome Threat Detection and Hunting / Resources / Osquery

osquery Across the Enterprise
osquery for Security — Part 1
osquery for Security — Part 2 Advanced osquery functionality, File integrity monitoring, process auditing, and more
Tracking a stolen code-signing certificate with osquery
Monitoring macOS hosts with osquery
Kolide's Blog
The osquery Extensions Skunkworks Project 1,434 9 days ago

Awesome Threat Detection and Hunting / Resources / DNS

Detecting DNS Tunneling
Hunting the Known Unknowns (with DNS)
Detecting dynamic DNS domains in Splunk
Random Words on Entropy and DNS
Tracking Newly Registered Domains
Suspicious Domains Tracking Dashboard
Proactive Malicious Domain Search
DNS is NOT Boring Using DNS to Expose and Thwart Attacks
Actionable Detects Blue Team Tactics

Awesome Threat Detection and Hunting / Resources / Fingerprinting

JA3: SSL/TLS Client Fingerprinting for Malware Detection
TLS Fingerprinting with JA3 and JA3S
HASSH - a profiling method for SSH Clients and Servers

Awesome Threat Detection and Hunting / Resources / Fingerprinting / HASSH - a profiling method for SSH Clients and Servers

HASSH @BSides Canberra 2019 - Slides 5 over 5 years ago

Awesome Threat Detection and Hunting / Resources / Fingerprinting

Finding Evil on the Network Using JA3/S and HASSH
RDP Fingerprinting - Profiling RDP Clients with JA3 and RDFP
Effective TLS Fingerprinting Beyond JA3
TLS Fingerprinting in the Real World
HTTP Client Fingerprinting Using SSL Handshake Analysis (source code:
TLS fingerprinting - Smarter Defending & Stealthier Attacking
JA3er a DB of JA3 fingerprints
An Introduction to HTTP fingerprinting
TLS Fingerprints collected from the University of Colorado Boulder campus network
The use of TLS in Censorship Circumvention
TLS Beyond the Browser: Combining End Host and Network Data to Understand Application Behavior
HTTPS traffic analysis and client identification using passive SSL/TLS fingerprinting
Markov Chain Fingerprinting to Classify Encrypted Traffic
HeadPrint: Detecting Anomalous Communications through Header-based Application Fingerprinting

Awesome Threat Detection and Hunting / Resources / Data Science

data_hacking 768 over 5 years ago Examples of using IPython, Pandas, and Scikit Learn to get the most out of your security data
Reverse engineering the analyst: building machine learning models for the SOC
msticpy 1,761 12 days ago A library for InfoSec investigation and hunting in Jupyter Notebooks

Awesome Threat Detection and Hunting / Resources / Research Papers

Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains
The Diamond Model of Intrusion Analysis
EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis
Paper A Comprehensive Approach to Intrusion Detection Alert Correlation ( , )
On Botnets that use DNS for Command and Control
Intelligent, Automated Red Team Emulation
Machine Learning for Encrypted Malware Traffic Classification

Awesome Threat Detection and Hunting / Resources / Blogs

David Bianco's Blog
DFIR and Threat Hunting Blog
CyberWardog's Blog ( )
Chris Sanders' Blog
Kolide Blog
Anton Chuvakin
Alexandre Teixeira
Awesome Kubernetes Threat Detection 357 about 1 year ago
Awesome Incident Response 7,561 3 months ago
Awesome Forensics 3,902 3 days ago
Awesome Honeypots 8,497 about 2 months ago
Awesome Malware Analysis 11,673 4 months ago
Awesome YARA 3,503 about 1 month ago
Awesome Security 12,288 2 months ago
Awesome Cloud Security 2,042 4 months ago

Awesome Threat Detection and Hunting / Podcasts

Cloud Security Podcast Google by Anton Chuvakin and Timothy Peacock
Detection: Challenging Paradigms by SpecterOps
Darknet Diaries by Andy Greenberg - True stories from the dark side of the Internet
Risky Business by Patrick Gray

Awesome Threat Detection and Hunting / Newsletters

Detection Engineering Weekly by Zack 'techy' Allen
This Week in 4n6 A weekly roundup of digital forensics and incident response news

Awesome Threat Detection and Hunting / Videos

SANS Threat Hunting and IR Summit 2017
SANS Threat Hunting and IR Summit 2016
BotConf 2016 - Advanced Incident Detection and Threat Hunting using Sysmon and Splunk
BSidesCharm 2017 - Detecting the Elusive: Active Directory Threat Hunting
BSidesAugusta 2017 - Machine Learning Fueled Cyber Threat Hunting
Toppling the Stack: Outlier Detection for Threat Hunters
BSidesPhilly 2017 - Threat Hunting: Defining the Process While Circumventing Corporate Obstacles
Black Hat 2017 - Revoke-Obfuscation: PowerShell Obfuscation Detection (And Evasion) Using Science
DefCon 25 - MS Just Gave the Blue Team Tactical Nukes
BSides London 2017 - Hunt or be Hunted
SecurityOnion 2017 - Pivoting Effectively to Catch More Bad Guys
SkyDogCon 2016 - Hunting: Defense Against The Dark Arts
BSidesAugusta 2017 - Don't Google 'PowerShell Hunting'
BSidesAugusta 2017 - Hunting Adversaries w Investigation Playbooks & OpenCNA
Visual Hunting with Linked Data
RVAs3c - Pyramid of Pain: Intel-Driven Detection/Response to Increase Adversary's Cost
BSidesLV 2016 - Hunting on the Endpoint w/ Powershell
Derbycon 2015 - Intrusion Hunting for the Masses A Practical Guide
BSides DC 2016 - Practical Cyborgism: Getting Start with Machine Learning for Incident Detection
SANS Webcast 2018 - What Event Logs? Part 1: Attacker Tricks to Remove Event Logs
Profiling And Detecting All Things SSL With JA3
ACoD 2019 - HASSH SSH Client/Server Profiling
QueryCon 2018 An annual conference for the osquery open-source community ( )
Visual Hunting with Linked Data Graphs
SecurityOnion Con 2018 - Introduction to Data Analysis
Insider Threats Detection at Airbus – AI up Against Data Leakage and Industrial Espionage
Cyber Security Investigations with Jupyter Notebooks

Awesome Threat Detection and Hunting / Trainings

Applied Network Defense courses by Chris Sanders
Security Blue Team (BTL1 and BTL2 certificates)
LetsDefend Hands-On SOC Analyst Training
TryHackMe Hands-on cyber security training through real-world scenarios
Investigating Windows Endpoints 13Cubed, by Richard Davis
HackTheBox While not directly related to threat detection, the website features training modules on general security and offensive topics that can be beneficial for junior SOC analysts

Awesome Threat Detection and Hunting / Labs

DetectionLab 4,615 3 months ago Vagrant & Packer scripts to build a lab environment complete with security tooling and logging best practices
Splunk Boss of the SOC Hands-on workshops and challenges to practice threat hunting using the BOTS and other datasets
HELK 3,749 4 months ago A Hunting ELK (Elasticsearch, Logstash, Kibana) with advanced analytic capabilities
BlueTeam Lab 139 over 1 year ago A detection lab created with Terraform and Ansible in Azure
attack_range 2,088 5 days ago A tool that allows you to create vulnerable instrumented local or cloud environments to simulate attacks against and collect the data into Splunk

Awesome Threat Detection and Hunting / Twitter

"Awesome Detection" Twitter List Twitter accounts that tweet about threat detection, hunting and DFIR

Awesome Threat Detection and Hunting / Threat Simulation Tools

MITRE CALDERA 5,535 10 days ago An automated adversary emulation system that performs post-compromise adversarial behavior within Windows Enterprise networks
APTSimulator 2,455 over 1 year ago A Windows Batch script that uses a set of tools and output files to make a system look as if it was compromised
Atomic Red Team 9,609 5 days ago Small and highly portable detection tests mapped to the Mitre ATT&CK Framework
Network Flight Simulator 1,245 6 months ago flightsim is a lightweight utility used to generate malicious network traffic and help security teams to evaluate security controls and network visibility
Metta 1,092 over 5 years ago A security preparedness tool to do adversarial simulation
Red Team Automation (RTA) 1,049 over 5 years ago RTA provides a framework of scripts designed to allow blue teams to test their detection capabilities against malicious tradecraft, modeled after MITRE ATT&CK
SharpShooter 1,787 about 2 months ago Payload Generation Framework
CACTUSTORCH 994 over 6 years ago Payload Generation for Adversary Simulations
DumpsterFire 987 over 4 years ago A modular, menu-driven, cross-platform tool for building repeatable, time-delayed, distributed security events
Empire 7,406 over 4 years ago ( ) - A PowerShell and Python post-exploitation agent
PowerSploit 11,812 about 4 years ago A PowerShell Post-Exploitation Framework
RedHunt-OS 1,239 about 4 years ago A Virtual Machine for Adversary Emulation and Threat Hunting. RedHunt aims to be a one stop shop for all your threat emulation and threat hunting needs by integrating attacker's arsenal as well as defender's toolkit to actively identify the threats in your environment
Infection Monkey 6,635 14 days ago An open source Breach and Attack Simulation (BAS) tool that assesses the resiliency of private and public cloud environments to post-breach attacks and lateral movement
Splunk Attack Range 2,088 5 days ago A tool that allows you to create vulnerable instrumented local or cloud environments to simulate attacks against and collect the data into Splunk

Awesome Threat Detection and Hunting / Threat Simulation Resources

MITRE's Adversary Emulation Plans
Awesome Red Teaming 6,846 9 months ago A list of awesome red teaming resources
Red-Team Infrastructure Wiki 4,113 6 months ago Wiki to collect Red Team infrastructure hardening resources
Payload Generation using SharpShooter
SpecterOps Blog

Awesome Threat Detection and Hunting / Threat Simulation Resources / SpecterOps Blog

Threat Hunting

Awesome Threat Detection and Hunting / Threat Simulation Resources

Advanced Threat Tactics A free course on red team operations and adversary simulations
Signal the ATT&CK: Part 1 Modelling APT32 in CALDERA
Red Teaming/Adversary Simulation Toolkit 8,998 about 1 month ago A collection of open source and commercial tools that aid in red team operations
C2 Matrix ( )
adversary_emulation_library 1,676 9 months ago An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs

Backlinks from these awesome lists: