Threat Hunting
Browse 35 cybersecurity tools tagged with "Threat Hunting"

ESET Protect MDR
Threat Hunting
ESET Protect MDR Ultimate on SecurityListing: A managed security service providing comprehensive endpoint protection, XDR capabilities, and 24/7 managed detection and response across multiple platforms and environments.

Pulsedive
Threat Hunting
Pulsedive on SecurityListing: Pulsedive is a threat intelligence platform that provides frictionless threat intelligence for growing teams, offering features such as indicator enrichment, threat research, and API integration.

Netlas
Threat Hunting
Netlas on SecurityListing: Threat intelligence and digital risk protection platform

Grep App
Threat Hunting
Grep App on SecurityListing: Search engine for open-source Git repositories with advanced features like case sensitivity and regular expressions.

Huntbase Platform
Threat Hunting
Huntbase Platform on SecurityListing: Platform for threat investigation with automation and knowledge management

RiskAnalytics Solutions Community
Threat Hunting
RiskAnalytics Solutions Community Projects on SecurityListing: RiskAnalytics Solutions offers community projects for cyber threat intelligence sharing and collaboration.

Incident Response with
Threat Hunting
Incident Response with Threat Intelligence on SecurityListing: A comprehensive guide to developing an incident response capability through intelligence-based threat hunting, covering theoretical concepts and real-life scenarios.

HoneyDB
Threat Hunting
HoneyDB on SecurityListing: HoneyDB is a honeypot-based threat intelligence platform that provides real-time insights into attacker behavior and malicious activity on networks.

Google Cloud Incident
Threat Hunting
Google Cloud Incident Response Cheat Sheet on SecurityListing: A comprehensive incident response and threat hunting tool for Google Cloud Platform, providing logs and forensic data for effective incident response and threat hunting.

InQuest Labs
Threat Hunting
InQuest Labs on SecurityListing: The Trystero Project is a threat intelligence platform that measures email security efficacy and provides various tools and resources, while VMware Carbon Black offers endpoint protection and workload security solutions.

Jupyter Notebooks for
Threat Hunting
Jupyter Notebooks for Threat Hunting on SecurityListing: Utilize Jupyter Notebooks to enhance threat hunting capabilities by focusing on different threat categories or stages.

Highlighter
Threat Hunting
Highlighter on SecurityListing: Highlighter is a FireEye Market app that integrates with FireEye products to provide enhanced cybersecurity capabilities.

Enterprise Detection &
Threat Hunting
Enterprise Detection & Response: A Simple Hunting Maturity Model on SecurityListing: A simple maturity model for enterprise detection and response

Prophet Security Prophet
Threat Hunting
Prophet Security Prophet AI Threat Hunter on SecurityListing: AI-driven threat hunting platform for SOC alert triage and investigation

detections.ai Detections
Threat Intelligence Platforms
detections.ai Detections on SecurityListing: Community platform for sharing and creating detection rules with AI

Golismero
Threat Hunting
Golismero on SecurityListing: A free and open-source OSINT framework for gathering and analyzing data from various sources

Detecting the Elusive
Threat Hunting
Detecting the Elusive - Active Directory Threat Hunting on SecurityListing: A comprehensive resource for threat hunting in Active Directory environments, covering tracking command-line/PowerShell activity, Kerberoasting detection, auditing attacker activity, and monitoring enterprise command-line activity.

AttackRuleMap
Threat Hunting
AttackRuleMap on SecurityListing: A mapping tool that correlates MITRE ATT&CK techniques with atomic tests and detection rules to analyze security detection coverage.

Logpoint NDR
Threat Hunting
Logpoint NDR on SecurityListing: A network detection and response solution that uses AI and machine learning to monitor network traffic, identify malicious behavior, and connect related security events to reveal attack patterns without requiring endpoint agents.

Non Human Identity
Threat Hunting
Non Human Identity Threat Center on SecurityListing: A threat intelligence platform that monitors, analyzes, and provides detailed information about threat actors targeting non-human identities across various industries.

Google Search Operators:
Threat Hunting
Google Search Operators: The Complete List (44 Advanced Operators) on SecurityListing: A reference guide listing 44 advanced Google search operators for enhanced search filtering and precision in information gathering activities.
CoordinatedTechnology

Cloud Security
CoordinatedTechnology is a cyber security firm focused on helping organizations securely pursue digital transformation. Based in Ras Al Khaimah, United Arab Emirates, the company provides services acr

Intezer
Threat Hunting
Intezer on SecurityListing: Intezer is a cloud-based malware analysis platform that detects and classifies malware using genetic code analysis.

INE Security
Threat Hunting
INE Security on SecurityListing: INE Security offers a range of cybersecurity certifications, including penetration testing, mobile and web application security, and incident response.

CTIChef.com Detection Feeds
Threat Hunting
CTIChef.com Detection Feeds on SecurityListing: A tiered cyber threat intelligence service providing detection rules from public repositories with varying levels of analysis, processing, and guidance for security teams.

Linux Detection Engineering
Threat Hunting
Linux Detection Engineering - A primer on persistence mechanisms on SecurityListing: A comprehensive guide on Linux persistence mechanisms, focusing on scheduled tasks and jobs, their implementation, detection, and hunting strategies.

CrowdStrike Threat Intelligence
Threat Intelligence Platforms
CrowdStrike Threat Intelligence on SecurityListing: Cyber threat intelligence platform with adversary tracking capabilities

SOAR
Threat Hunting
SOAR on SecurityListing: A Security Orchestration, Automation and Response (SOAR) platform for incident response and threat hunting.

threat_note
Threat Hunting
threat_note on SecurityListing: A comprehensive Threat Intelligence Program Management Solution for managing the entire CTI lifecycle.

Talion Managed Detection
Threat Hunting
Talion Managed Detection & Response (MDR) on SecurityListing: 24/7 MDR service with threat hunting, containment, and SOC collaboration

Simbian AI Threat
Threat Hunting
Simbian AI Threat Hunt Agent on SecurityListing: AI agent that autonomously validates threat hunt hypotheses across enterprise data

Sigma Query
Threat Hunting
Sigma Query on SecurityListing: Searchable repository of Sigma detection rules for threat hunting and SIEM

Zeronsec Threat Intelligence
Threat Intelligence Platforms
Zeronsec Threat Intelligence on SecurityListing: Threat intelligence platform for detection, hunting, and remediation

AfterGlow
Threat Hunting
AfterGlow on SecurityListing: Visualize and analyze network relationships with AfterGlow

Censys Threat Hunting
Threat Hunting
Censys Threat Hunting on SecurityListing: Proactive threat hunting platform for detecting adversary infrastructure