Threat Hunting

Explore 97 curated cybersecurity tools, with 14,519+ visitors searching for solutions

FEATURED

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

plast Logo

Modular Threat Hunting Tool & Framework

0
HoneySMB Logo

A high-interaction honeypot solution for detecting and analyzing SMB-based attacks

0
Golismero Logo

A free and open-source OSINT framework for gathering and analyzing data from various sources

0
Cyber Threat Hunting Logo

A collection of tools and resources for threat hunters.

0
Windows-Hunting Logo

A repository to aid Windows threat hunters in looking for common artifacts.

0
Sentinel ATT&CK Logo

A threat hunting capability that leverages Sysmon and MITRE ATT&CK on Azure Sentinel

0
Intezer Logo

Intezer is a cloud-based malware analysis platform that detects and classifies malware using genetic code analysis.

1
ThreatMapper Logo

A runtime threat management and attack path enumeration tool for cloud-native environments

0
threat_note Logo

A comprehensive Threat Intelligence Program Management Solution for managing the entire CTI lifecycle.

0
iMISP Logo

A honeypot designed to detect and analyze malicious activities in instant messaging platforms.

0
Google Cloud Incident Response Cheat Sheet Logo

A comprehensive incident response and threat hunting tool for Google Cloud Platform, providing logs and forensic data for effective incident response and threat hunting.

0
Community Security Analytics (CSA) Logo

A community-driven repository of pre-built security analytics queries and rules for monitoring and detecting threats in Google Cloud environments across various log sources and activity types.

0
ThreatHunting Logo

A Splunk app mapped to MITRE ATT&CK to guide threat hunts.

0
Netlas Logo

Threat intelligence and digital risk protection platform

0
Python IOC Editor v0.9.8 Logo

PyIOCe is a Python-based OpenIOC editor that enables security professionals to create, edit, and manage Indicators of Compromise for threat intelligence and incident response operations.

0
HoneyDB Logo

HoneyDB is a honeypot-based threat intelligence platform that provides real-time insights into attacker behavior and malicious activity on networks.

0
IOCextractor Logo

A program to extract IOCs from text files using regular expressions

0
ATT&CK® Navigator Logo

A web-based visualization tool for navigating and annotating MITRE ATT&CK matrices to support threat analysis, defensive planning, and security coverage assessment.

0
InQuest YARA Rules Logo

A collection of YARA rules for research and hunting purposes.

0
YARA Matches Correspondance Array (YMCA) Logo

Tool for visualizing correspondences between YARA ruleset and samples

0
RedHunt Linux Distribution (VM) v2 Logo

A Linux distribution designed for threat emulation and threat hunting, integrating attacker and defender tools for identifying threats in your environment.

0
DeepBlueCLI Logo

A PowerShell module for threat hunting and security analysis through Windows Event Log processing and malicious activity detection.

0
ThreatHunting Project Logo

A community-driven informational repository providing resources and guidance for hunting adversaries in IT environments.

0
FireEye Mandiant SunBurst Countermeasures Logo

FireEye Mandiant SunBurst Countermeasures: freely available rules for detecting malicious files and activity

0