Windows-Hunting

Security toolkit

A collection of tools and resources to aid Windows threat hunters in identifying common security artifacts.

GitHub

347 stars
35 watching
93 forks
last commit: over 3 years ago
Linked from 1 awesome list


Backlinks from these awesome lists:

Related projects:

Repository Description Stars
sapphirex00/threat-hunting A collection of threat intelligence resources and tools for analyzing APT malware 255
sbousseaden/slides Collection of resources and concepts for threat hunting and detection engineering. 372
m4ll0k/bbtz A collection of tools and examples for hunting bugs in software applications 1,720
a3sal0n/cyberthreathunting A collection of tools and resources for threat hunters to identify and respond to cyber threats. 855
mhaggis/hunt-detect-prevent A collection of resources and tools for detecting and preventing malicious activity on Windows systems. 162
gossithedog/threathunting Tools and rules for detecting malicious domain calls in endpoint malware 568
nullsecuritynet/tools Provides tools, exploits, and code snippets for security research and education purposes. 39
t4d/phishingkithunter A tool to identify phishing kits by analyzing referer URLs from legitimate websites' logs. 225
pjrinaldi/wombatforensics A multi-threaded GUI forensic analysis tool for Linux 47
13o-bbr-bbq/machine_learning_security This project explores the intersection of machine learning and security, focusing on developing tools and techniques to improve vulnerability detection and penetration testing in web applications. 1,979
bugcrowd/hunt An extension for Burp Suite that provides a structured approach to identifying and testing common vulnerability parameters. 2,183
threathuntingproject/threathunting An informational repository providing resources and knowledge for detecting adversaries in IT environments. 1,722
zt2/sqli-hunter A tool that automates the process of detecting and exploiting SQL injection vulnerabilities in web applications. 423
dissectmalware/officeforensictools A Python-based collection of tools for gathering forensic information from Office documents 26
bats3c/shad0w A post-exploitation toolset designed to operate covertly on heavily monitored environments. 2,045