threat-hunting
Here are 8 public repositories matching this topic...
DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC & Blue Team to gain situational awareness of the organisation's web exposure on the pastesites. It Utilises Google's indexing of pastesites to gain targeted intelligence of the organisation. Blue & SOC teams can…
-
Updated
Apr 9, 2022 - C#
S2AN - Mapper of Sigma/Suricata Rules/Signatures ➡️ MITRE ATT&CK Navigator
-
Updated
Dec 8, 2022 - C#
ETWNetMonv3 is simple C# code for Monitoring TCP Network Connection via ETW & ETWProcessMon/2 is for Monitoring Process/Thread/Memory/Imageloads/TCPIP via ETW + Detection for Remote-Thread-Injection & Payload Detection by VirtualMemAlloc Events (in-memory) etc.
-
Updated
Jun 6, 2023 - C#
Safe virtual drive which prevent threats being executed
-
Updated
Aug 11, 2023 - C#
A C# client for Vertex Synapse
-
Updated
Nov 10, 2023 - C#
A file system forensics analysis scanner and threat hunting tool. Scans file systems at the MFT and OS level and stores data in SQL, SQLite or CSV. Threats and data can be probed harnessing the power and syntax of SQL.
-
Updated
Mar 25, 2024 - C#
A C# software client consumes FortiSandbox API to Triger a scan job for a specific file directly from the endpoint
-
Updated
Oct 13, 2024 - C#
Improve this page
Add a description, image, and links to the threat-hunting topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the threat-hunting topic, visit your repo's landing page and select "manage topics."