Threat Hunting

Explore 107 curated cybersecurity tools, with 16,024+ visitors searching for solutions

FEATURED

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

Filter by:
EQL Analytics Library Logo

A library of event-based analytics written in EQL to detect adversary behaviors identified in MITRE ATT&CK, providing detection rules for the Elastic Stack.

0
Polyswarm Logo

PolySwarm is a malware intelligence marketplace that aggregates threat detection engines to provide early detection, unique samples, and higher accuracy.

0
Intel Owl Logo

An Open Source solution for management of Threat Intelligence at scale, integrating multiple analyzers and malware analysis tools.

0
Cortex Logo

Cortex is a tool for analyzing observables at scale and automating threat intelligence, digital forensics, and incident response.

0
Blauhaunt Logo

A tool collection for filtering and visualizing logon events, designed for experienced DFIR specialists in threat hunting and incident response.

0
InQuest Labs Logo

The Trystero Project is a threat intelligence platform that measures email security efficacy and provides various tools and resources, while VMware Carbon Black offers endpoint protection and workload security solutions.

0
PCAP-ATTACK Logo

A container of PCAP captures mapped to the relevant attack tactic

0
Windows EVTX Samples [200 EVTX examples] Logo

Container of 200 Windows EVTX samples for testing detection scripts and training on DFIR.

0
Incident Response with Threat Intelligence Logo

A comprehensive guide to developing an incident response capability through intelligence-based threat hunting, covering theoretical concepts and real-life scenarios.

0
Pulsedive Logo

Pulsedive is a threat intelligence platform that provides frictionless threat intelligence for growing teams, offering features such as indicator enrichment, threat research, and API integration.

0
msticpy Logo

msticpy is a Python library for InfoSec investigation and threat hunting in Jupyter Notebooks, providing data querying, threat intelligence enrichment, analysis capabilities, and interactive visualizations.

0