ThreatHunting-Keywords VS awesome-lists

Compare ThreatHunting-Keywords vs awesome-lists and see what are their differences.

InfluxDB - Power Real-Time Data Analytics at Scale
Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
www.influxdata.com
featured
SaaSHub - Software Alternatives and Reviews
SaaSHub helps you find the best software and product alternatives
www.saashub.com
featured
ThreatHunting-Keywords awesome-lists
1 1
339 205
- -
9.4 9.8
1 day ago 5 days ago
HTML PowerShell
MIT License -
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

ThreatHunting-Keywords

Posts with mentions or reviews of ThreatHunting-Keywords. We have used some of these posts to build our list of alternatives and similar projects.

awesome-lists

Posts with mentions or reviews of awesome-lists. We have used some of these posts to build our list of alternatives and similar projects.

What are some alternatives?

When comparing ThreatHunting-Keywords and awesome-lists you can also consider the following projects:

sysmon-config - Advanced Sysmon ATT&CK configuration focusing on Detecting the Most Techniques per Data source in MITRE ATT&CK, Provide Visibility into Forensic Artifact Events for UEBA, Detect Exploitation events with wide CVE Coverage, and Risk Scoring of CVE, UEBA, Forensic, and MITRE ATT&CK Events.

Purpleteam - Purpleteam scripts simulation & Detection - trigger events for SOC detections

reversinglabs-siem-rules - A collection of various SIEM rules relating to malware family groups.

awesome-hacker-search-engines - A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Bounty and more

UltimateAppLockerByPassList - The goal of this repository is to document the most common techniques to bypass AppLocker.

MurMurHash - This little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform.

awesome-powershell - A curated list of delightful PowerShell modules and resources

awesome-mac -  Now we have become very big, Different from the original idea. Collect premium software in various categories.

awesome-executable-packing - A curated list of awesome resources related to executable packing