Product Hunt Launch!CybersecTools - Find and share cybersecurity tools across 944 use cases | Product Hunt
APT-Hunter Logo

APT-Hunter

A threat hunting tool for Windows event logs to detect APT movements and decrease the time to uncover suspicious activity.

1,370
Security Operations
Free
Visit website
0

APT-Hunter Description

APT-Hunter is a Threat Hunting tool for Windows event logs which made by purple team mindset to detect APT movements hidden in the sea of Windows event logs to decrease the time to uncover suspicious activity. APT-Hunter uses pre-defined detection rules and focuses on statistics to uncover abnormalities which is very effective in compromise assessment. The output produced with a timeline that can be analyzed directly from Excel, Timeline Explorer, Timesketch, etc... Full information about the tool and how it's used in this article: introducing-apt-hunter-threat-hunting-tool-using-windows-event-log New Release Info: APT-HUNTER V3.0: Rebuilt with Multiprocessing and new cool features Author Twitter: @ahmed_khlief Linkedin: Ahmed Khlief Download APT-Hunter: Download the latest stable version of APT-Hunter with compiled binaries from Releases page. How to Use APT-Hunter: APT-Hunter built using python3 so in order to use the tool you need to install the required libraries. python3 -m pip install -r requirements.txt APT-Hunter is easy to use, you just use the argument -h to print help to see the options needed. python3 APT-Hunter.py -h Examples: Analyzing EVTX files, you can use the following command: python3 APT-Hunter.py -e <path_to_evt_file>

APT-Hunter FAQ

Common questions about APT-Hunter including features, pricing, alternatives, and user reviews.

APT-Hunter is A threat hunting tool for Windows event logs to detect APT movements and decrease the time to uncover suspicious activity.. It is a Security Operations solution designed to help security teams with Incident Response, Threat Hunting, Threat Detection.

Have more questions? Browse our categories or search for specific tools.

FEATURED

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Stay Updated with Mandos Brief

Get the latest cybersecurity updates in your inbox

POPULAR

RoboShadow Logo

Automated vulnerability assessment and remediation platform

12
TestSavantAI Logo

Security platform that provides protection, monitoring and governance for enterprise generative AI applications and LLMs against various threats including prompt injection and data poisoning.

6
Cybersec Feeds Logo

A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.

6
OSINTLeak Logo

OSINTLeak is a tool for discovering and analyzing leaked sensitive information across various online sources to identify potential security risks.

5
Mandos Brief Cybersecurity Newsletter Logo

Weekly cybersecurity newsletter for security leaders and professionals

5
View Popular Tools →