Loading...
Browse 483 threat hunting tools
A managed security service that uses hypothesis-based threat hunting to proactively discover hidden threats, create new detection rules, and improve overall security posture.
A managed security service that uses hypothesis-based threat hunting to proactively discover hidden threats, create new detection rules, and improve overall security posture.
Threat intelligence platform with deep/dark web monitoring and OSINT data
Threat intelligence platform with deep/dark web monitoring and OSINT data
CTI platform combining automated collection with cyber HUMINT for threat intel
CTI platform combining automated collection with cyber HUMINT for threat intel
Threat intelligence platform combining Google, Mandiant, and VirusTotal data
Threat intelligence platform combining Google, Mandiant, and VirusTotal data
AI-powered MDR platform with SOC services for threat detection and response
AI-powered MDR platform with SOC services for threat detection and response
Managed SOC service hosted in Saudi Arabia with 24/7 monitoring and IR
Managed SOC service hosted in Saudi Arabia with 24/7 monitoring and IR
Enterprise threat intelligence platform for identifying and prioritizing threats
Enterprise threat intelligence platform for identifying and prioritizing threats
EDR solution with behavioral analytics and MITRE ATT&CK mapping
EDR solution with behavioral analytics and MITRE ATT&CK mapping
AI-powered SOC platform for automated alert triage, incident response & logging
AI-powered SOC platform for automated alert triage, incident response & logging
A mapping tool that correlates MITRE ATT&CK techniques with atomic tests and detection rules to analyze security detection coverage.
A mapping tool that correlates MITRE ATT&CK techniques with atomic tests and detection rules to analyze security detection coverage.
A threat intelligence platform that monitors, analyzes, and provides detailed information about threat actors targeting non-human identities across various industries.
A threat intelligence platform that monitors, analyzes, and provides detailed information about threat actors targeting non-human identities across various industries.
AI-powered security operations platform for autonomous alert triage & response
AI-powered security operations platform for autonomous alert triage & response
A comprehensive guide on Linux persistence mechanisms, focusing on scheduled tasks and jobs, their implementation, detection, and hunting strategies.
A comprehensive guide on Linux persistence mechanisms, focusing on scheduled tasks and jobs, their implementation, detection, and hunting strategies.
The Ransomware Tool Matrix is a repository that lists and categorizes tools used by ransomware gangs, aiding in threat hunting, incident response, and adversary emulation.
The Ransomware Tool Matrix is a repository that lists and categorizes tools used by ransomware gangs, aiding in threat hunting, incident response, and adversary emulation.
Wazuh is an open-source security platform offering unified XDR and SIEM protection for endpoints and cloud workloads, integrating various security functions into a single architecture.
Wazuh is an open-source security platform offering unified XDR and SIEM protection for endpoints and cloud workloads, integrating various security functions into a single architecture.
AI-driven SOC platform with unified data lake, threat intel, and automation
AI-driven SOC platform with unified data lake, threat intel, and automation
Managed threat hunting service detecting evasive threats in network environments
Managed threat hunting service detecting evasive threats in network environments
AI-powered security assistant for autonomous threat detection and response
AI-powered security assistant for autonomous threat detection and response
Security operations platform combining SIEM, UEBA, and SOAR capabilities
Security operations platform combining SIEM, UEBA, and SOAR capabilities
AI-powered security operations platform for automated threat analysis and response
AI-powered security operations platform for automated threat analysis and response
Kunai is a Linux-based system monitoring tool that provides real-time monitoring and threat hunting capabilities.
Kunai is a Linux-based system monitoring tool that provides real-time monitoring and threat hunting capabilities.
Threat intelligence platform providing real-time data from 300bn+ daily IPs
Threat intelligence platform providing real-time data from 300bn+ daily IPs
A comprehensive resource for threat hunting in Active Directory environments, covering tracking command-line/PowerShell activity, Kerberoasting detection, auditing attacker activity, and monitoring enterprise command-line activity.
A comprehensive resource for threat hunting in Active Directory environments, covering tracking command-line/PowerShell activity, Kerberoasting detection, auditing attacker activity, and monitoring enterprise command-line activity.
24x7x365 MDR service with expert-led threat monitoring and remediation
24x7x365 MDR service with expert-led threat monitoring and remediation
Get strategic cybersecurity insights in your inbox
Real-time OSINT monitoring for leaked credentials, data, and infrastructure
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance