Threat Hunting
Threat hunting tools and platforms for proactive threat detection, advanced persistent threat (APT) discovery, and security investigation.
Explore 83 curated cybersecurity tools, with 15,426 visitors searching for solutions
FEATURED
Cybercrime intelligence tools for searching compromised credentials from infostealers
Password manager with end-to-end encryption and identity protection features
VPN service providing encrypted internet connections and privacy protection
Fractional CISO services for B2B companies to build security programs
Get Featured
Feature your product and reach thousands of professionals.
- Home
- Categories
- Security Operations
- Threat Hunting
RELATED TASKS
Full-fidelity packet capture & forensics module for network threat hunting
Full-fidelity packet capture & forensics module for network threat hunting
Managed threat hunting service combining ML analytics and human expertise
Managed threat hunting service combining ML analytics and human expertise
Human-led threat hunting service for uncovering hidden adversaries
Human-led threat hunting service for uncovering hidden adversaries
Threat hunting platform for credentials, phishing, malicious domains & leaks
Threat hunting platform for credentials, phishing, malicious domains & leaks
Managed threat hunting service for network activity monitoring and analysis
Managed threat hunting service for network activity monitoring and analysis
AI agent that autonomously validates threat hunt hypotheses across enterprise data
AI agent that autonomously validates threat hunt hypotheses across enterprise data
AI-driven threat hunting platform for SOC alert triage and investigation
AI-driven threat hunting platform for SOC alert triage and investigation
Community platform for sharing and creating detection rules with AI
Community platform for sharing and creating detection rules with AI
Proactive threat hunting platform for detecting adversary infrastructure
Proactive threat hunting platform for detecting adversary infrastructure
Proactive threat hunting platform for detecting and investigating attacks
Proactive threat hunting platform for detecting and investigating attacks
Akamai Hunt is a managed threat hunting service that detects and remediates evasive security risks in network environments using data analysis, AI, and expert investigation.
Akamai Hunt is a managed threat hunting service that detects and remediates evasive security risks in network environments using data analysis, AI, and expert investigation.
Kunai is a Linux-based system monitoring tool that provides real-time monitoring and threat hunting capabilities.
Kunai is a Linux-based system monitoring tool that provides real-time monitoring and threat hunting capabilities.
A tool for identifying potential security threats by fetching known URLs and filtering out URLs with open redirection or SSRF parameters.
A tool for identifying potential security threats by fetching known URLs and filtering out URLs with open redirection or SSRF parameters.
A comprehensive resource for threat hunting in Active Directory environments, covering tracking command-line/PowerShell activity, Kerberoasting detection, auditing attacker activity, and monitoring enterprise command-line activity.
A comprehensive resource for threat hunting in Active Directory environments, covering tracking command-line/PowerShell activity, Kerberoasting detection, auditing attacker activity, and monitoring enterprise command-line activity.
A powerful OSINT tool for creating custom templates for data extraction and analysis
A powerful OSINT tool for creating custom templates for data extraction and analysis
A repository of officially managed detection rules for the Falco runtime security monitoring system that identifies threats, abnormal behaviors, and compliance violations through syscall and container event analysis.
A repository of officially managed detection rules for the Falco runtime security monitoring system that identifies threats, abnormal behaviors, and compliance violations through syscall and container event analysis.
YLS Language Server for YARA Language with comprehensive features and Python 3.8 support.
YLS Language Server for YARA Language with comprehensive features and Python 3.8 support.
A repository of freely usable Yara rules for detection systems, with automated error detection workflows.
A repository of freely usable Yara rules for detection systems, with automated error detection workflows.
A free and open-source OSINT framework for gathering and analyzing data from various sources
A free and open-source OSINT framework for gathering and analyzing data from various sources
A collection of tools and resources for threat hunters.
A free web-based Yara debugger for security analysts to write hunting or detection rules with ease.
A free web-based Yara debugger for security analysts to write hunting or detection rules with ease.
Stay Updated with Mandos Brief
Get the latest cybersecurity updates in your inbox
TRENDING CATEGORIES
POPULAR
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance
Real-time OSINT monitoring for leaked credentials, data, and infrastructure
FEATURED
Cybercrime intelligence tools for searching compromised credentials from infostealers
Password manager with end-to-end encryption and identity protection features
VPN service providing encrypted internet connections and privacy protection
Fractional CISO services for B2B companies to build security programs
Threat Hunting Tools - FAQ
Common questions about Threat Hunting tools including selection guides, pricing, and comparisons.
Threat hunting tools and platforms for proactive threat detection, advanced persistent threat (APT) discovery, and security investigation.