Threat Hunting

Explore 107 curated cybersecurity tools, with 15,538+ visitors searching for solutions

FEATURED

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

Filter by:
Strelka Logo

Strelka is a real-time, container-based file scanning system that performs file extraction and metadata collection at enterprise scale for threat hunting, detection, and incident response.

0
Jupyter Notebooks for Threat Hunting Logo

Utilize Jupyter Notebooks to enhance threat hunting capabilities by focusing on different threat categories or stages.

0
Splunk Boss of the SOC Logo

Blue-team capture the flag competition for improving cybersecurity skills.

0
ADBHoney Logo

A low-interaction honeypot for detecting and analyzing potential attacks on Android devices via ADB over TCP/IP

0
Sigma Logo

Sigma is a generic and open signature format for SIEM systems and other security tools to detect and respond to threats.

0
Microsoft Sentinel and Microsoft 365 Defender Logo

Unified repository for Microsoft Sentinel and Microsoft 365 Defender containing security content, detections, queries, playbooks, and resources to secure environments and hunt for threats.

0
RiskAnalytics Solutions Community Projects Logo

RiskAnalytics Solutions offers community projects for cyber threat intelligence sharing and collaboration.

0
INE Security Logo

INE Security offers a range of cybersecurity certifications, including penetration testing, mobile and web application security, and incident response.

1
QRadio Logo

QRadio is a tool/framework designed to consolidate cyber threats intelligence sources.

0
Bitscout Logo

Bitscout is a Bash-based live OS constructor tool for building customizable forensic environments used in remote system triage, malware hunting, and digital forensics investigations.

0
Applied Incident Response Logo

A comprehensive guide to incident response, providing effective techniques for responding to advanced attacks against local and remote network resources.

0
Palo Alto Networks Cortex XDR Logo

XDR platform with endpoint security and threat detection capabilities

1
Root the Box Logo

Root the Box is a real-time CTF scoring engine that provides a configurable platform for cybersecurity training through gamified wargames and competitions.

0
Microsoft Sentinel Ninja Training Logo

Level 400 training to become a Microsoft Sentinel Ninja.

0
AfterGlow Logo

Visualize and analyze network relationships with AfterGlow

0
Hayabusa Logo

Windows event log fast forensics timeline generator and threat hunting tool.

0
PSHunt Logo

Powershell Threat Hunting Module for scanning remote endpoints and collecting comprehensive information.

0
Unfetter Logo

Unfetter is a reference implementation framework that collects events from client machines and performs CAR analytics using an ELK stack with Apache Spark to detect potential adversary activity.

0
GOSINT Logo

Open Source Threat Intelligence Gathering and Processing Framework

0
rastrea2r Logo

A cybersecurity tool for collecting and analyzing forensic artifacts on live systems.

0
yara_repo Logo

Repository of Yara Rules created by TjNel.

0
Red Teaming Toolkit Logo

A comprehensive repository of open-source security tools organized by attack phases for red team operations, adversary simulation, and threat hunting purposes.

0
FastFinder Logo

Fast suspicious file finder for threat hunting and live forensics.

0
APT-Hunter Logo

A threat hunting tool for Windows event logs to detect APT movements and decrease the time to uncover suspicious activity.

0