Windows-Hunting
Security toolkit
A collection of tools and resources to aid Windows threat hunters in identifying common security artifacts.
347 stars
35 watching
93 forks
last commit: almost 4 years ago
Linked from 1 awesome list
Related projects:
Repository | Description | Stars |
---|---|---|
sapphirex00/threat-hunting | A collection of threat intelligence resources and tools for analyzing APT malware | 257 |
sbousseaden/slides | Collection of resources and concepts for threat hunting and detection engineering. | 372 |
m4ll0k/bbtz | A collection of tools and examples for hunting bugs in software applications | 1,725 |
a3sal0n/cyberthreathunting | A collection of tools and resources for threat hunters to identify and respond to cyber threats. | 861 |
mhaggis/hunt-detect-prevent | A collection of resources and tools for detecting and preventing malicious activity on Windows systems. | 162 |
gossithedog/threathunting | Tools and rules for detecting malicious domain calls in endpoint malware | 570 |
nullsecuritynet/tools | Provides tools, exploits, and code snippets for security research and education purposes. | 39 |
t4d/phishingkithunter | A tool to identify phishing kits by analyzing referer URLs from legitimate websites' logs. | 228 |
pjrinaldi/wombatforensics | A multi-threaded GUI forensic analysis tool for Linux | 48 |
13o-bbr-bbq/machine_learning_security | An open-source project that explores the intersection of machine learning and security to develop tools for detecting vulnerabilities in web applications. | 1,987 |
bugcrowd/hunt | An extension for Burp Suite that provides a structured approach to identifying and testing common vulnerability parameters. | 2,192 |
threathuntingproject/threathunting | An informational repository providing resources and knowledge for detecting adversaries in IT environments. | 1,726 |
zt2/sqli-hunter | A tool that automates the process of detecting and exploiting SQL injection vulnerabilities in web applications. | 425 |
dissectmalware/officeforensictools | A Python-based collection of tools for gathering forensic information from Office documents | 26 |
bats3c/shad0w | A post-exploitation toolset designed to operate covertly on heavily monitored environments. | 2,058 |