Jupyter Notebooks for Threat Hunting Logo

Jupyter Notebooks for Threat Hunting

0
Free
Visit Website

Jupyter Notebooks are used to create capabilities around categories or stages of threats, allowing users to consume, enrich, and output data for gaining insights that may not be visible otherwise. The tool emphasizes the importance of continuously adding new methods, data sources, and expertise to enhance the hunting process.

FEATURES

ALTERNATIVES

Curated datasets for developing and testing detections in SIEM installations.

A curated list of resources for learning about deploying, managing, and hunting with Microsoft Sysmon.

API for querying domain security information, categorization, and related data.

Packet Storm is a global security resource providing around-the-clock information and tools to mitigate personal data and fiscal loss on a global scale.

C# wrapper around Yara pattern matching library with Loki and Yara signature support.

Signature-based YARA rules for detecting and preventing threats within Linux, Windows, and macOS systems.

A command-line tool that fetches known URLs from various sources to identify potential security threats and vulnerabilities.

Cyber Intelligence Management Platform with threat tracking, forensic artifacts, and YARA rule storage.