Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality. Learn more →
Threathunting Alternatives
Similar projects and alternatives to threathunting
-
Incident-Playbook
GOAL: Incident Response Playbooks Mapped to MITRE Attack Tactics and Techniques. [Contributors Friendly]
-
InfluxDB
Power Real-Time Data Analytics at Scale. Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
-
hashlookup-forensic-analyser
Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service - https://circl.lu/services/hashlookup/
-
WorkOS
The modern identity platform for B2B SaaS. The APIs are flexible and easy-to-use, supporting authentication, user identity, and complex enterprise features like SSO and SCIM provisioning.
-
ATTACKdatamap
A datasource assessment on an event level to show potential coverage or the MITRE ATT&CK framework
threathunting reviews and mentions
-
Breaking down MITRE ATT&CK for ICS techniques into MON Requirements?
Olaf has a Splunk module for 'threat hunting' that's mapped to the Enterprise Mitre framework, might be a good example for some components - https://github.com/olafhartong/ThreatHunting - Note: If you just blindly install it... It's pretty rough on the search head...
-
How to extract hash value from hashes field from sysmon log.
Well i'm working with this ThreatHunting app (https://github.com/olafhartong/ThreatHunting) basicly we utilize Mitre Attack framework to create sysmon rule in order to detect malwares and attacks on your computer. I'm trying to create a custom script scan the process hashes to check weather it is a threat or not cause
-
How to extract
ThreatHunting app: https://github.com/olafhartong/threathunting/
-
A note from our sponsor - InfluxDB
www.influxdata.com | 19 Apr 2024
Stats
olafhartong/threathunting is an open source project licensed under MIT License which is an OSI approved license.
The primary programming language of threathunting is Python.
Popular Comparisons
- threathunting VS Incident-Playbook
- threathunting VS sysmon-modular
- threathunting VS splunk-connect-for-syslog
- threathunting VS splunk-spl
- threathunting VS threathunting-spl
- threathunting VS hashlookup-forensic-analyser
- threathunting VS ChatGPT-4-Splunk
- threathunting VS atc-react
- threathunting VS Mitre2Datatables