Jupyter Notebooks for Threat Hunting Logo

Jupyter Notebooks for Threat Hunting

0
Free
Updated 11 March 2025
Visit Website

Jupyter Notebooks are used to create capabilities around categories or stages of threats, allowing users to consume, enrich, and output data for gaining insights that may not be visible otherwise. The tool emphasizes the importance of continuously adding new methods, data sources, and expertise to enhance the hunting process.

FEATURES

SIMILAR TOOLS

Signature-based YARA rules for detecting and preventing threats within Linux, Windows, and macOS systems.

Repository of YARA rules for identifying and classifying malware.

A visualization tool for threat analysis that organizes APT campaign information and visualizes relations of IOC.

Threat hunting tool leveraging Windows events for identifying outliers and suspicious behavior.

HoneyDB is a honeypot-based threat intelligence platform that provides real-time insights into attacker behavior and malicious activity on networks.

A container of PCAP captures mapped to the relevant attack tactic

GCTI's open-source detection signatures for malware and threat detection

Get insights into the latest cybersecurity trends and expert advice on enhancing organizational security.

A system for collecting, managing, and distributing security information on a large scale, developed by CERT Polska.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Operated by:

Mandos Cyber • KVK: 97994448

Netherlands • contact@mandos.io

VAT: NL005301434B12

Copyright © 2025 - All rights reserved