Hunt-Detect-Prevent Logo

Hunt-Detect-Prevent

0
Free
Visit Website

Lists of sources and utilities to hunt, detect, and prevent evildoers. Resources include AD Security, Microsoft EMET, Microsoft ATA, Microsoft File Screening, Threat Hunting, PowerShell Log hunting, and more.

FEATURES

ALTERNATIVES

Real-time monitoring tool for newly issued SSL certificates.

NECOMA focuses on data collection, threat analysis, and developing new cyberdefense mechanisms to protect infrastructure and endpoints.

A tiered cyber threat intelligence service providing detection rules from public repositories with varying levels of analysis, processing, and guidance for security teams.

API for querying domain security information, categorization, and related data.

A platform for accessing threat intelligence and collaborating on cyber threats.

GCTI's open-source detection signatures for malware and threat detection

Tools to export data from MISP MySQL database for post-incident analysis and correlation.

A reference implementation for collecting events and performing CAR analytics to detect potential adversary activity.

PINNED