Jupyter Notebooks for Threat Hunting Logo

Jupyter Notebooks for Threat Hunting

0
Free
Visit Website

Jupyter Notebooks are used to create capabilities around categories or stages of threats, allowing users to consume, enrich, and output data for gaining insights that may not be visible otherwise. The tool emphasizes the importance of continuously adding new methods, data sources, and expertise to enhance the hunting process.

FEATURES

ALTERNATIVES

Public access to Indicators of Compromise (IoCs) and other data for readers of Security Scorecard's technical blog posts and reports.

A cybersecurity tool for managing data points and cyber threat indicators with a focus on neo4j data traversal.

A threat intelligence service providing actionable IoCs and security data feeds to help organizations detect, block, and respond to cyber threats.

A threat intelligence platform that monitors, analyzes, and provides detailed information about threat actors targeting non-human identities across various industries.

Yara rule generator using VirusTotal code similarity feature code-similar-to.

A python3 application for querying sites hosting publicly pasted data and scanning for sensitive information.

A reference implementation for collecting events and performing CAR analytics to detect potential adversary activity.

DNSDumpster is a domain research tool for discovering and analyzing DNS records to map an organization's attack surface.

PINNED