Threat Hunting

Explore 107 curated cybersecurity tools, with 16,024+ visitors searching for solutions

FEATURED

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

Filter by:
AttackRuleMap Logo

A mapping tool that correlates MITRE ATT&CK techniques with atomic tests and detection rules to analyze security detection coverage.

0
Non Human Identity Threat Center Logo

A threat intelligence platform that monitors, analyzes, and provides detailed information about threat actors targeting non-human identities across various industries.

0
System Two Security Logo

An AI-powered platform that automates threat hunting and analysis by processing cyber threat intelligence and generating customized hunt packages for SOC teams.

0
Linux Detection Engineering -  A primer on persistence mechanisms Logo

A comprehensive guide on Linux persistence mechanisms, focusing on scheduled tasks and jobs, their implementation, detection, and hunting strategies.

0
Ransomware Tool Matrix Logo

The Ransomware Tool Matrix is a repository that lists and categorizes tools used by ransomware gangs, aiding in threat hunting, incident response, and adversary emulation.

0
Wazuh Logo

Wazuh is an open-source security platform offering unified XDR and SIEM protection for endpoints and cloud workloads, integrating various security functions into a single architecture.

2
Akamai Hunt Logo

Akamai Hunt is a managed threat hunting service that detects and remediates evasive security risks in network environments using data analysis, AI, and expert investigation.

0
SentinelOne Purple AI Logo

AI-powered security operations platform for automated threat analysis and response

0
Kunai Logo

Kunai is a Linux-based system monitoring tool that provides real-time monitoring and threat hunting capabilities.

0
Detecting the Elusive - Active Directory Threat Hunting Logo

A comprehensive resource for threat hunting in Active Directory environments, covering tracking command-line/PowerShell activity, Kerberoasting detection, auditing attacker activity, and monitoring enterprise command-line activity.

0
plast Logo

Modular Threat Hunting Tool & Framework

0
HoneySMB Logo

A high-interaction honeypot solution for detecting and analyzing SMB-based attacks

0
Golismero Logo

A free and open-source OSINT framework for gathering and analyzing data from various sources

0
Cyber Threat Hunting Logo

A collection of tools and resources for threat hunters.

0
Windows-Hunting Logo

A repository to aid Windows threat hunters in looking for common artifacts.

0
Sentinel ATT&CK Logo

A threat hunting capability that leverages Sysmon and MITRE ATT&CK on Azure Sentinel

0
Intezer Logo

Intezer is a cloud-based malware analysis platform that detects and classifies malware using genetic code analysis.

1
ThreatMapper Logo

A runtime threat management and attack path enumeration tool for cloud-native environments

0
threat_note Logo

A comprehensive Threat Intelligence Program Management Solution for managing the entire CTI lifecycle.

0
iMISP Logo

A honeypot designed to detect and analyze malicious activities in instant messaging platforms.

0
Google Cloud Incident Response Cheat Sheet Logo

A comprehensive incident response and threat hunting tool for Google Cloud Platform, providing logs and forensic data for effective incident response and threat hunting.

0
Community Security Analytics (CSA) Logo

A community-driven repository of pre-built security analytics queries and rules for monitoring and detecting threats in Google Cloud environments across various log sources and activity types.

0
ThreatHunting Logo

A Splunk app mapped to MITRE ATT&CK to guide threat hunts.

0
Netlas Logo

Threat intelligence and digital risk protection platform

0