ThreatHunting Project
An informational repo about hunting for adversaries in your IT environment. Be sure to visit ThreatHunting.net for more info about this repo. Here's the deal, in plain English: This repo is here for the community. You are free to use it for personal or commercial use provided you attribute it in some visible manner. We suggest "Data provided by the ThreatHunting Project, https://github.com/ThreatHuntingProject/ThreatHunting" or something substantially similar. Please do include the URL, though, to help more people find us.
FEATURES
ALTERNATIVES
LOKI is a simple IOC and YARA Scanner for Indicators of Compromise Detection.
A modular malware collection and processing framework with support for various threat intelligence feeds.
Cyber Intelligence Management Platform with threat tracking, forensic artifacts, and YARA rule storage.
Home for rules used by Elastic Security with code for unit testing, Kibana integration, and Red Team Automation.
Repository containing IoCs related to Volexity's threat intelligence blog posts and tools.
MISP is an open source threat intelligence platform that enhances threat information sharing and analysis.
A comprehensive list of APT groups and operations for tracking and mapping different names and naming schemes used by cybersecurity companies and antivirus vendors.
PINNED
Fabric Platform by BlackStork
Fabric Platform is a cybersecurity reporting solution that automates and standardizes report generation, offering a private-cloud platform, open-source tools, and community-supported templates.
Mandos Brief Newsletter
Stay ahead in cybersecurity. Get the week's top cybersecurity news and insights in 8 minutes or less.
Wiz
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.
Adversa AI
Adversa AI is a cybersecurity company that provides solutions for securing and hardening machine learning, artificial intelligence, and large language models against adversarial attacks, privacy issues, and safety incidents across various industries.