Threat Hunting
Browse 35 cybersecurity tools tagged with "Threat Hunting"
Pulsedive
Threat Hunting
Pulsedive on SecurityListing: Pulsedive is a threat intelligence platform that provides frictionless threat intelligence for growing teams, offering features such as indicator enrichment, threat research, and API integration.
ESET Protect MDR
Threat Hunting
ESET Protect MDR Ultimate on SecurityListing: A managed security service providing comprehensive endpoint protection, XDR capabilities, and 24/7 managed detection and response across multiple platforms and environments.
Netlas
Threat Hunting
Netlas on SecurityListing: Threat intelligence and digital risk protection platform
Grep App
Threat Hunting
Grep App on SecurityListing: Search engine for open-source Git repositories with advanced features like case sensitivity and regular expressions.
Enterprise Detection &
Threat Hunting
Enterprise Detection & Response: A Simple Hunting Maturity Model on SecurityListing: A simple maturity model for enterprise detection and response
Huntbase Platform
Threat Hunting
Huntbase Platform on SecurityListing: Platform for threat investigation with automation and knowledge management
detections.ai Detections
Threat Intelligence Platforms
detections.ai Detections on SecurityListing: Community platform for sharing and creating detection rules with AI
Google Cloud Incident
Threat Hunting
Google Cloud Incident Response Cheat Sheet on SecurityListing: A comprehensive incident response and threat hunting tool for Google Cloud Platform, providing logs and forensic data for effective incident response and threat hunting.
InQuest Labs
Threat Hunting
InQuest Labs on SecurityListing: The Trystero Project is a threat intelligence platform that measures email security efficacy and provides various tools and resources, while VMware Carbon Black offers endpoint protection and workload security solutions.
HoneyDB
Threat Hunting
HoneyDB on SecurityListing: HoneyDB is a honeypot-based threat intelligence platform that provides real-time insights into attacker behavior and malicious activity on networks.
Incident Response with
Threat Hunting
Incident Response with Threat Intelligence on SecurityListing: A comprehensive guide to developing an incident response capability through intelligence-based threat hunting, covering theoretical concepts and real-life scenarios.
Prophet Security Prophet
Threat Hunting
Prophet Security Prophet AI Threat Hunter on SecurityListing: AI-driven threat hunting platform for SOC alert triage and investigation
Highlighter
Threat Hunting
Highlighter on SecurityListing: Highlighter is a FireEye Market app that integrates with FireEye products to provide enhanced cybersecurity capabilities.
Jupyter Notebooks for
Threat Hunting
Jupyter Notebooks for Threat Hunting on SecurityListing: Utilize Jupyter Notebooks to enhance threat hunting capabilities by focusing on different threat categories or stages.
RiskAnalytics Solutions Community
Threat Hunting
RiskAnalytics Solutions Community Projects on SecurityListing: RiskAnalytics Solutions offers community projects for cyber threat intelligence sharing and collaboration.
Detecting the Elusive
Threat Hunting
Detecting the Elusive - Active Directory Threat Hunting on SecurityListing: A comprehensive resource for threat hunting in Active Directory environments, covering tracking command-line/PowerShell activity, Kerberoasting detection, auditing attacker activity, and monitoring enterprise command-line activity.
Golismero
Threat Hunting
Golismero on SecurityListing: A free and open-source OSINT framework for gathering and analyzing data from various sources
Google Search Operators:
Threat Hunting
Google Search Operators: The Complete List (44 Advanced Operators) on SecurityListing: A reference guide listing 44 advanced Google search operators for enhanced search filtering and precision in information gathering activities.
CoordinatedTechnology

Cloud Security
CoordinatedTechnology is a cyber security firm focused on helping organizations securely pursue digital transformation. Based in Ras Al Khaimah, United Arab Emirates, the company provides services acr
Logpoint NDR
Threat Hunting
Logpoint NDR on SecurityListing: A network detection and response solution that uses AI and machine learning to monitor network traffic, identify malicious behavior, and connect related security events to reveal attack patterns without requiring endpoint agents.
Non Human Identity
Threat Hunting
Non Human Identity Threat Center on SecurityListing: A threat intelligence platform that monitors, analyzes, and provides detailed information about threat actors targeting non-human identities across various industries.
AttackRuleMap
Threat Hunting
AttackRuleMap on SecurityListing: A mapping tool that correlates MITRE ATT&CK techniques with atomic tests and detection rules to analyze security detection coverage.
Intezer
Threat Hunting
Intezer on SecurityListing: Intezer is a cloud-based malware analysis platform that detects and classifies malware using genetic code analysis.
INE Security
Threat Hunting
INE Security on SecurityListing: INE Security offers a range of cybersecurity certifications, including penetration testing, mobile and web application security, and incident response.
CTIChef.com Detection Feeds
Threat Hunting
CTIChef.com Detection Feeds on SecurityListing: A tiered cyber threat intelligence service providing detection rules from public repositories with varying levels of analysis, processing, and guidance for security teams.
Linux Detection Engineering
Threat Hunting
Linux Detection Engineering - A primer on persistence mechanisms on SecurityListing: A comprehensive guide on Linux persistence mechanisms, focusing on scheduled tasks and jobs, their implementation, detection, and hunting strategies.
AfterGlow
Threat Hunting
AfterGlow on SecurityListing: Visualize and analyze network relationships with AfterGlow
Sigma Query
Threat Hunting
Sigma Query on SecurityListing: Searchable repository of Sigma detection rules for threat hunting and SIEM
CrowdStrike Threat Intelligence
Threat Intelligence Platforms
CrowdStrike Threat Intelligence on SecurityListing: Cyber threat intelligence platform with adversary tracking capabilities
Censys Threat Hunting
Threat Hunting
Censys Threat Hunting on SecurityListing: Proactive threat hunting platform for detecting adversary infrastructure
SOAR
Threat Hunting
SOAR on SecurityListing: A Security Orchestration, Automation and Response (SOAR) platform for incident response and threat hunting.
Zeronsec Threat Intelligence
Threat Intelligence Platforms
Zeronsec Threat Intelligence on SecurityListing: Threat intelligence platform for detection, hunting, and remediation
Talion Managed Detection
Threat Hunting
Talion Managed Detection & Response (MDR) on SecurityListing: 24/7 MDR service with threat hunting, containment, and SOC collaboration
threat_note
Threat Hunting
threat_note on SecurityListing: A comprehensive Threat Intelligence Program Management Solution for managing the entire CTI lifecycle.
Simbian AI Threat
Threat Hunting
Simbian AI Threat Hunt Agent on SecurityListing: AI agent that autonomously validates threat hunt hypotheses across enterprise data