Hunting

Explore 7 curated cybersecurity tools, with 15,370 visitors searching for solutions

FEATURED

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Logo

Fractional CISO services for B2B companies to build security programs

Get Featured

Feature your product and reach thousands of professionals.

YaraDbg Logo

A free web-based Yara debugger for security analysts to write hunting or detection rules with ease.

0
Enterprise Detection & Response: A Simple Hunting Maturity Model Logo

A simple maturity model for enterprise detection and response

0
CimSweep Logo

CimSweep is a suite of CIM/WMI-based tools for incident response and hunting operations on Windows systems without the need to deploy an agent.

0
statiStrings Logo

A strings statistics calculator for YARA rules to aid malware research.

0
PSHunt Logo

Powershell Threat Hunting Module for scanning remote endpoints and collecting comprehensive information.

0
Yara-Rules Repository Logo

Repository of YARA rules for Trellix ATR blogposts and investigations

0
msticpy Logo

msticpy is a Python library for InfoSec investigation and threat hunting in Jupyter Notebooks, providing data querying, threat intelligence enrichment, analysis capabilities, and interactive visualizations.

0