Loading...
Threat hunting tools and platforms for proactive threat detection, advanced persistent threat (APT) discovery, and security investigation.
Browse 84 threat hunting tools
Managed threat hunting service with 24/7 expert hunters and AI-powered analysis
Managed threat hunting service with 24/7 expert hunters and AI-powered analysis
Platform for threat investigation with automation and knowledge management
Platform for threat investigation with automation and knowledge management
Full-fidelity packet capture & forensics module for network threat hunting
Full-fidelity packet capture & forensics module for network threat hunting
Managed threat hunting service combining ML analytics and human expertise
Managed threat hunting service combining ML analytics and human expertise
Human-led threat hunting service for uncovering hidden adversaries
Human-led threat hunting service for uncovering hidden adversaries
Threat hunting platform for credentials, phishing, malicious domains & leaks
Threat hunting platform for credentials, phishing, malicious domains & leaks
Managed threat hunting service for network activity monitoring and analysis
Managed threat hunting service for network activity monitoring and analysis
AI agent that autonomously validates threat hunt hypotheses across enterprise data
AI agent that autonomously validates threat hunt hypotheses across enterprise data
AI-driven threat hunting platform for SOC alert triage and investigation
AI-driven threat hunting platform for SOC alert triage and investigation
Community platform for sharing and creating detection rules with AI
Community platform for sharing and creating detection rules with AI
Proactive threat hunting platform for detecting adversary infrastructure
Proactive threat hunting platform for detecting adversary infrastructure
Proactive threat hunting platform for detecting and investigating attacks
Proactive threat hunting platform for detecting and investigating attacks
Managed threat hunting service detecting evasive threats in network environments
Managed threat hunting service detecting evasive threats in network environments
Kunai is a Linux-based system monitoring tool that provides real-time monitoring and threat hunting capabilities.
Kunai is a Linux-based system monitoring tool that provides real-time monitoring and threat hunting capabilities.
A tool for identifying potential security threats by fetching known URLs and filtering out URLs with open redirection or SSRF parameters.
A tool for identifying potential security threats by fetching known URLs and filtering out URLs with open redirection or SSRF parameters.
A comprehensive resource for threat hunting in Active Directory environments, covering tracking command-line/PowerShell activity, Kerberoasting detection, auditing attacker activity, and monitoring enterprise command-line activity.
A comprehensive resource for threat hunting in Active Directory environments, covering tracking command-line/PowerShell activity, Kerberoasting detection, auditing attacker activity, and monitoring enterprise command-line activity.
A powerful OSINT tool for creating custom templates for data extraction and analysis
A powerful OSINT tool for creating custom templates for data extraction and analysis
A repository of officially managed detection rules for the Falco runtime security monitoring system that identifies threats, abnormal behaviors, and compliance violations through syscall and container event analysis.
A repository of officially managed detection rules for the Falco runtime security monitoring system that identifies threats, abnormal behaviors, and compliance violations through syscall and container event analysis.
YLS Language Server for YARA Language with comprehensive features and Python 3.8 support.
YLS Language Server for YARA Language with comprehensive features and Python 3.8 support.
A repository of freely usable Yara rules for detection systems, with automated error detection workflows.
A repository of freely usable Yara rules for detection systems, with automated error detection workflows.
A free and open-source OSINT framework for gathering and analyzing data from various sources
A free and open-source OSINT framework for gathering and analyzing data from various sources
A collection of tools and resources for threat hunters.
Common questions about Threat Hunting tools including selection guides, pricing, and comparisons.
Threat hunting tools and platforms for proactive threat detection, advanced persistent threat (APT) discovery, and security investigation.
Fix-first AppSec powered by agentic remediation, covering SCA, SAST & secrets.
Cybercrime intelligence tools for searching compromised credentials from infostealers
Password manager with end-to-end encryption and identity protection features
Fractional CISO services for B2B companies to build security programs
Real-time OSINT monitoring for leaked credentials, data, and infrastructure
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance
A comprehensive educational resource that provides structured guidance on penetration testing methodology, tools, and techniques organized around the penetration testing attack chain.
Get strategic cybersecurity insights in your inbox