ThreatHunting
Domain scanner
Tools and rules for detecting malicious domain calls in endpoint malware
Tools for hunting for threats.
570 stars
50 watching
55 forks
Language: YARA
last commit: 4 months ago nexthinkthreat-hunting
Related projects:
Repository | Description | Stars |
---|---|---|
| Tools for identifying suitable domains for malicious activities | 1,554 |
| A collection of tools and resources for threat hunters to identify and respond to cyber threats. | 861 |
| Collection of resources and concepts for threat hunting and detection engineering. | 372 |
| An informational repository providing resources and knowledge for detecting adversaries in IT environments. | 1,726 |
| A collection of threat intelligence resources and tools for analyzing APT malware | 257 |
| An aggregator tool for querying multiple services to gather threat intelligence data. | 870 |
| A Powershell Threat Hunting Module designed to scan and survey remote endpoints for indicators of compromise or comprehensive system information. | 280 |
| A platform for searching and analyzing publicly available online data to detect potential security threats | 515 |
| A PowerShell repository to simulate and train threat hunting skills without malicious files. | 134 |
| Automates scanning of publicly hosted pasted data against Yara rules to identify potential security or research threats. | 1,069 |
| A tool for hunting and tracking Internet of Things (IoT) security threats by collecting and analyzing indicators of compromise (IOCs) | 116 |
| A collection of resources and tools for detecting and preventing malicious activity on Windows systems. | 162 |
| Tools for testing and verifying threat detection rules | 322 |
| Tools and utilities to support the BloodHound threat hunting framework | 380 |
| Extracts and aggregates threat intelligence from various sources | 836 |