search
Join or Log In

Threat Hunting

Browse 35 cybersecurity tools tagged with "Threat Hunting"

ESET Protect MDR Ultimate

ESET Protect MDR

language

Threat Hunting

ESET Protect MDR Ultimate on SecurityListing: A managed security service providing comprehensive endpoint protection, XDR capabilities, and 24/7 managed detection and response across multiple platforms and environments.

4.7(2)
Pulsedive

Pulsedive

language

Threat Hunting

Pulsedive on SecurityListing: Pulsedive is a threat intelligence platform that provides frictionless threat intelligence for growing teams, offering features such as indicator enrichment, threat research, and API integration.

4.7(2)
Netlas

Netlas

language

Threat Hunting

Netlas on SecurityListing: Threat intelligence and digital risk protection platform

4.5(3)
Grep App

Grep App

language

Threat Hunting

Grep App on SecurityListing: Search engine for open-source Git repositories with advanced features like case sensitivity and regular expressions.

4.5(1)
Huntbase Platform

Huntbase Platform

language

Threat Hunting

Huntbase Platform on SecurityListing: Platform for threat investigation with automation and knowledge management

4.5(1)
RiskAnalytics Solutions Community Projects

RiskAnalytics Solutions Community

language

Threat Hunting

RiskAnalytics Solutions Community Projects on SecurityListing: RiskAnalytics Solutions offers community projects for cyber threat intelligence sharing and collaboration.

4.5(1)
Incident Response with Threat Intelligence

Incident Response with

language

Threat Hunting

Incident Response with Threat Intelligence on SecurityListing: A comprehensive guide to developing an incident response capability through intelligence-based threat hunting, covering theoretical concepts and real-life scenarios.

4.5(1)
HoneyDB

HoneyDB

language

Threat Hunting

HoneyDB on SecurityListing: HoneyDB is a honeypot-based threat intelligence platform that provides real-time insights into attacker behavior and malicious activity on networks.

4.5(1)
Google Cloud Incident Response Cheat Sheet

Google Cloud Incident

language

Threat Hunting

Google Cloud Incident Response Cheat Sheet on SecurityListing: A comprehensive incident response and threat hunting tool for Google Cloud Platform, providing logs and forensic data for effective incident response and threat hunting.

4.5(1)
InQuest Labs

InQuest Labs

language

Threat Hunting

InQuest Labs on SecurityListing: The Trystero Project is a threat intelligence platform that measures email security efficacy and provides various tools and resources, while VMware Carbon Black offers endpoint protection and workload security solutions.

4.5(1)
Jupyter Notebooks for Threat Hunting

Jupyter Notebooks for

language

Threat Hunting

Jupyter Notebooks for Threat Hunting on SecurityListing: Utilize Jupyter Notebooks to enhance threat hunting capabilities by focusing on different threat categories or stages.

4.5(1)
Highlighter

Highlighter

language

Threat Hunting

Highlighter on SecurityListing: Highlighter is a FireEye Market app that integrates with FireEye products to provide enhanced cybersecurity capabilities.

4.5(1)
Enterprise Detection & Response: A Simple Hunting Maturity Model

Enterprise Detection &

language

Threat Hunting

Enterprise Detection & Response: A Simple Hunting Maturity Model on SecurityListing: A simple maturity model for enterprise detection and response

4.5(1)
Prophet Security Prophet AI Threat Hunter

Prophet Security Prophet

language

Threat Hunting

Prophet Security Prophet AI Threat Hunter on SecurityListing: AI-driven threat hunting platform for SOC alert triage and investigation

4.5(1)
detections.ai Detections

detections.ai Detections

language

Threat Intelligence Platforms

detections.ai Detections on SecurityListing: Community platform for sharing and creating detection rules with AI

4.5(1)
Golismero

Golismero

language

Threat Hunting

Golismero on SecurityListing: A free and open-source OSINT framework for gathering and analyzing data from various sources

4.3(2)
Detecting the Elusive - Active Directory Threat Hunting

Detecting the Elusive

language

Threat Hunting

Detecting the Elusive - Active Directory Threat Hunting on SecurityListing: A comprehensive resource for threat hunting in Active Directory environments, covering tracking command-line/PowerShell activity, Kerberoasting detection, auditing attacker activity, and monitoring enterprise command-line activity.

4.3(2)
AttackRuleMap

AttackRuleMap

language

Threat Hunting

AttackRuleMap on SecurityListing: A mapping tool that correlates MITRE ATT&CK techniques with atomic tests and detection rules to analyze security detection coverage.

3.8(1)
Logpoint NDR

Logpoint NDR

language

Threat Hunting

Logpoint NDR on SecurityListing: A network detection and response solution that uses AI and machine learning to monitor network traffic, identify malicious behavior, and connect related security events to reveal attack patterns without requiring endpoint agents.

3.8(1)
Non Human Identity Threat Center

Non Human Identity

language

Threat Hunting

Non Human Identity Threat Center on SecurityListing: A threat intelligence platform that monitors, analyzes, and provides detailed information about threat actors targeting non-human identities across various industries.

3.8(1)
Google Search Operators: The Complete List (44 Advanced Operators)

Google Search Operators:

language

Threat Hunting

Google Search Operators: The Complete List (44 Advanced Operators) on SecurityListing: A reference guide listing 44 advanced Google search operators for enhanced search filtering and precision in information gathering activities.

3.8(1)
CoordinatedTechnology

CoordinatedTechnology

United Arab Emirates flag

Cloud Security

CoordinatedTechnology is a cyber security firm focused on helping organizations securely pursue digital transformation. Based in Ras Al Khaimah, United Arab Emirates, the company provides services acr

3.8(1)
Intezer

Intezer

language

Threat Hunting

Intezer on SecurityListing: Intezer is a cloud-based malware analysis platform that detects and classifies malware using genetic code analysis.

3.8(1)
INE Security

INE Security

language

Threat Hunting

INE Security on SecurityListing: INE Security offers a range of cybersecurity certifications, including penetration testing, mobile and web application security, and incident response.

3.8(1)
CTIChef.com Detection Feeds

CTIChef.com Detection Feeds

language

Threat Hunting

CTIChef.com Detection Feeds on SecurityListing: A tiered cyber threat intelligence service providing detection rules from public repositories with varying levels of analysis, processing, and guidance for security teams.

3.8(1)
Linux Detection Engineering -  A primer on persistence mechanisms

Linux Detection Engineering

language

Threat Hunting

Linux Detection Engineering - A primer on persistence mechanisms on SecurityListing: A comprehensive guide on Linux persistence mechanisms, focusing on scheduled tasks and jobs, their implementation, detection, and hunting strategies.

3.8(1)
CrowdStrike Threat Intelligence

CrowdStrike Threat Intelligence

language

Threat Intelligence Platforms

CrowdStrike Threat Intelligence on SecurityListing: Cyber threat intelligence platform with adversary tracking capabilities

SOAR

SOAR

language

Threat Hunting

SOAR on SecurityListing: A Security Orchestration, Automation and Response (SOAR) platform for incident response and threat hunting.

threat_note

threat_note

language

Threat Hunting

threat_note on SecurityListing: A comprehensive Threat Intelligence Program Management Solution for managing the entire CTI lifecycle.

Talion Managed Detection & Response (MDR)

Talion Managed Detection

language

Threat Hunting

Talion Managed Detection & Response (MDR) on SecurityListing: 24/7 MDR service with threat hunting, containment, and SOC collaboration

Simbian AI Threat Hunt Agent

Simbian AI Threat

language

Threat Hunting

Simbian AI Threat Hunt Agent on SecurityListing: AI agent that autonomously validates threat hunt hypotheses across enterprise data

Sigma Query

Sigma Query

language

Threat Hunting

Sigma Query on SecurityListing: Searchable repository of Sigma detection rules for threat hunting and SIEM

Zeronsec Threat Intelligence

Zeronsec Threat Intelligence

language

Threat Intelligence Platforms

Zeronsec Threat Intelligence on SecurityListing: Threat intelligence platform for detection, hunting, and remediation

AfterGlow

AfterGlow

language

Threat Hunting

AfterGlow on SecurityListing: Visualize and analyze network relationships with AfterGlow

Censys Threat Hunting

Censys Threat Hunting

language

Threat Hunting

Censys Threat Hunting on SecurityListing: Proactive threat hunting platform for detecting adversary infrastructure