Threat Hunting

Explore 107 curated cybersecurity tools, with 16,024+ visitors searching for solutions

FEATURED

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

Filter by:
Python IOC Editor v0.9.8 Logo

PyIOCe is a Python-based OpenIOC editor that enables security professionals to create, edit, and manage Indicators of Compromise for threat intelligence and incident response operations.

0
HoneyDB Logo

HoneyDB is a honeypot-based threat intelligence platform that provides real-time insights into attacker behavior and malicious activity on networks.

0
IOCextractor Logo

A program to extract IOCs from text files using regular expressions

0
ATT&CK® Navigator Logo

A web-based visualization tool for navigating and annotating MITRE ATT&CK matrices to support threat analysis, defensive planning, and security coverage assessment.

0
InQuest YARA Rules Logo

A collection of YARA rules for research and hunting purposes.

0
YARA Matches Correspondance Array (YMCA) Logo

Tool for visualizing correspondences between YARA ruleset and samples

0
RedHunt Linux Distribution (VM) v2 Logo

A Linux distribution designed for threat emulation and threat hunting, integrating attacker and defender tools for identifying threats in your environment.

0
DeepBlueCLI Logo

A PowerShell module for threat hunting and security analysis through Windows Event Log processing and malicious activity detection.

0
ThreatHunting Project Logo

A community-driven informational repository providing resources and guidance for hunting adversaries in IT environments.

0
FireEye Mandiant SunBurst Countermeasures Logo

FireEye Mandiant SunBurst Countermeasures: freely available rules for detecting malicious files and activity

0
Oriana Logo

Threat hunting tool leveraging Windows events for identifying outliers and suspicious behavior.

0
Cloud Academy Logo

Comprehensive endpoint protection platform providing unified visibility and security for cloud workloads, endpoints, and containers.

0
Hunt-Detect-Prevent Logo

Lists of sources and utilities to hunt, detect, and prevent evildoers.

0
AppCompatProcessor Logo

A digital forensics tool that extracts and analyzes Windows AppCompat and AmCache registry data for enterprise-scale forensic investigations.

0
IPsum Logo

Daily feed of bad IPs with blacklist hit scores for cybersecurity professionals to stay informed about malicious IP addresses.

0
Highlighter Logo

Highlighter is a FireEye Market app that integrates with FireEye products to provide enhanced cybersecurity capabilities.

0
Elastic Security YARA Rules Logo

Signature-based YARA rules for detecting and preventing threats within Linux, Windows, and macOS systems.

0
Telekom Security Malware Analysis Repository Logo

Repository of scripts, signatures, and IOCs related to various malware analysis topics.

0
SOAR Logo

A Security Orchestration, Automation and Response (SOAR) platform for incident response and threat hunting.

0
ChopShop Logo

ChopShop is a MITRE framework that helps analysts create pynids-based decoders and detectors for identifying APT tradecraft in network traffic.

0
The Threat Hunter Playbook Logo

A community-driven open source project providing interactive notebooks with detection logic, adversary tradecraft, and resources organized according to MITRE ATT&CK framework for threat hunting and detection development.

0
Cisco Secure Endpoint Logo

Cisco Secure Endpoint is a cloud-native endpoint security solution that provides advanced protection and response to threats.

0
Cybereason Defense Platform Logo

Unified defense platform providing endpoint protection, extended detection and response, threat hunting, and digital forensics and incident response.

0
YARA Rules Collection Logo

Collection of YARA signatures from recent malware research.

0