Hunt-Detect-Prevent Logo

Hunt-Detect-Prevent

0
Free
Visit Website

Lists of sources and utilities to hunt, detect, and prevent evildoers. Resources include AD Security, Microsoft EMET, Microsoft ATA, Microsoft File Screening, Threat Hunting, PowerShell Log hunting, and more.

FEATURES

ALTERNATIVES

The FASTEST Way to Consume Threat Intelligence and make it actionable.

A free software that calculates the security ranking of Internet Service Providers to detect malicious activities.

A platform providing an activity feed on exploited vulnerabilities.

NECOMA focuses on data collection, threat analysis, and developing new cyberdefense mechanisms to protect infrastructure and endpoints.

A repository to aid Windows threat hunters in looking for common artifacts.

The Cybersecurity and Infrastructure Security Agency (CISA) is a government agency that provides alerts, advisories, and resources to help protect the United States' critical infrastructure from cyber threats.

Deception based detection techniques with MITRE ATT&CK mapping and Honey Resources.

A python3 application for querying sites hosting publicly pasted data and scanning for sensitive information.