Jupyter Notebooks for Threat Hunting Logo

Jupyter Notebooks for Threat Hunting

0
Free
Visit Website

Jupyter Notebooks are used to create capabilities around categories or stages of threats, allowing users to consume, enrich, and output data for gaining insights that may not be visible otherwise. The tool emphasizes the importance of continuously adding new methods, data sources, and expertise to enhance the hunting process.

FEATURES

ALTERNATIVES

A tool for tracking, scanning, and filtering yara files with distributed scanning capabilities.

A reference implementation for collecting events and performing CAR analytics to detect potential adversary activity.

C# wrapper around Yara pattern matching library with Loki and Yara signature support.

Repository of automatically generated YARA rules from Malpedia's YARA-Signator with detailed statistics.

Nessus efficiently scans for system vulnerabilities, misconfigurations, and compliance issues.

Repository of Yara Rules created by TjNel.

A repository of Yara signatures under the GNU-GPLv2 license for the cybersecurity community.

Intelligence feeds for cybersecurity professionals to stay informed about emerging threats and trends.