Loading...
Threat hunting tools and platforms for proactive threat detection, advanced persistent threat (APT) discovery, and security investigation.
Explore 82 curated cybersecurity tools, with 15,216 visitors searching for solutions
Full-fidelity packet capture & forensics module for network threat hunting
Full-fidelity packet capture & forensics module for network threat hunting
Managed threat hunting service combining ML analytics and human expertise
Managed threat hunting service combining ML analytics and human expertise
Human-led threat hunting service for uncovering hidden adversaries
Human-led threat hunting service for uncovering hidden adversaries
Threat hunting platform for credentials, phishing, malicious domains & leaks
Threat hunting platform for credentials, phishing, malicious domains & leaks
Managed threat hunting service for network activity monitoring and analysis
Managed threat hunting service for network activity monitoring and analysis
AI agent that autonomously validates threat hunt hypotheses across enterprise data
AI agent that autonomously validates threat hunt hypotheses across enterprise data
AI-driven threat hunting platform for SOC alert triage and investigation
AI-driven threat hunting platform for SOC alert triage and investigation
Community platform for sharing and creating detection rules with AI
Community platform for sharing and creating detection rules with AI
Proactive threat hunting platform for detecting adversary infrastructure
Proactive threat hunting platform for detecting adversary infrastructure
Proactive threat hunting platform for detecting and investigating attacks
Proactive threat hunting platform for detecting and investigating attacks
Akamai Hunt is a managed threat hunting service that detects and remediates evasive security risks in network environments using data analysis, AI, and expert investigation.
Akamai Hunt is a managed threat hunting service that detects and remediates evasive security risks in network environments using data analysis, AI, and expert investigation.
Kunai is a Linux-based system monitoring tool that provides real-time monitoring and threat hunting capabilities.
Kunai is a Linux-based system monitoring tool that provides real-time monitoring and threat hunting capabilities.
A tool for identifying potential security threats by fetching known URLs and filtering out URLs with open redirection or SSRF parameters.
A tool for identifying potential security threats by fetching known URLs and filtering out URLs with open redirection or SSRF parameters.
A comprehensive resource for threat hunting in Active Directory environments, covering tracking command-line/PowerShell activity, Kerberoasting detection, auditing attacker activity, and monitoring enterprise command-line activity.
A comprehensive resource for threat hunting in Active Directory environments, covering tracking command-line/PowerShell activity, Kerberoasting detection, auditing attacker activity, and monitoring enterprise command-line activity.
A powerful OSINT tool for creating custom templates for data extraction and analysis
A powerful OSINT tool for creating custom templates for data extraction and analysis
A repository of officially managed detection rules for the Falco runtime security monitoring system that identifies threats, abnormal behaviors, and compliance violations through syscall and container event analysis.
A repository of officially managed detection rules for the Falco runtime security monitoring system that identifies threats, abnormal behaviors, and compliance violations through syscall and container event analysis.
YLS Language Server for YARA Language with comprehensive features and Python 3.8 support.
YLS Language Server for YARA Language with comprehensive features and Python 3.8 support.
A repository of freely usable Yara rules for detection systems, with automated error detection workflows.
A repository of freely usable Yara rules for detection systems, with automated error detection workflows.
A free and open-source OSINT framework for gathering and analyzing data from various sources
A free and open-source OSINT framework for gathering and analyzing data from various sources
A collection of tools and resources for threat hunters.
A free web-based Yara debugger for security analysts to write hunting or detection rules with ease.
A free web-based Yara debugger for security analysts to write hunting or detection rules with ease.
Common questions about Threat Hunting tools including selection guides, pricing, and comparisons.
Threat hunting tools and platforms for proactive threat detection, advanced persistent threat (APT) discovery, and security investigation.
Get the latest cybersecurity updates in your inbox
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance
Real-time OSINT monitoring for leaked credentials, data, and infrastructure
Cybercrime intelligence tools for searching compromised credentials from infostealers
Password manager with end-to-end encryption and identity protection features
Fractional CISO services for B2B companies to build security programs