Hunt-Detect-Prevent Logo

Hunt-Detect-Prevent

0
Free
Visit Website

Lists of sources and utilities to hunt, detect, and prevent evildoers. Resources include AD Security, Microsoft EMET, Microsoft ATA, Microsoft File Screening, Threat Hunting, PowerShell Log hunting, and more.

FEATURES

ALTERNATIVES

Gathers Threat Intelligence Feeds from publicly available sources and provides detailed output in CSV format.

Repository of YARA rules for identifying and classifying malware.

VX-Underground is a vast online repository of malware samples, featuring various collections for cybersecurity professionals and researchers to analyze and combat cyber threats.

Signature-based YARA rules for detecting and preventing threats within Linux, Windows, and macOS systems.

Public access to Indicators of Compromise (IoCs) and other data for readers of Security Scorecard's technical blog posts and reports.

Maltiverse automates Threat Intelligence for small and medium-sized SecOps teams, providing an effective and affordable service.

A free and open-source OSINT framework for gathering and analyzing data from various sources

VirusTotal API v3 is a threat intelligence platform for scanning files, URLs, and IP addresses, and retrieving reports on threat reputation and context.