start.me Open in urlscan Pro
23.22.5.68  Public Scan

URL: https://start.me/p/OmOrJb/threat-hunting
Submission: On September 02 via manual from IN — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

WIR RESPEKTIEREN IHRE PRIVATSPHÄRE

Wir und unsere Partner speichern und/oder greifen auf Informationen auf Geräten
(z. B. Cookies) zu und verarbeiten personenbezogene Daten, z. B. eindeutige
Identifikatoren und standardmäßige Informationen, die von Geräten für
personalisierte Anzeigen und Inhalte, Anzeigen- und Inhaltsmessung sowie
Erkenntnisse über Zielgruppen gesendet werden und um Produkte zu entwickeln und
zu verbessern. Mit Ihrer Erlaubnis dürfen wir und unsere Partner über
Gerätescans genaue Standortdaten und Kenndaten abfragen. Sie können auf die
entsprechende Schaltfläche klicken, um der o. a. Datenverarbeitung durch uns und
unsere Partner zuzustimmen. Alternativ können Sie auf detailliertere
Informationen zugreifen und Ihre Einstellungen ändern, bevor Sie der
Verarbeitung zustimmen oder diese ablehnen. Bitte beachten Sie, dass die
Verarbeitung mancher personenbezogenen Daten ohne Ihre Einwilligung stattfinden
kann, obwohl Sie das Recht haben, einer solchen Verarbeitung zu widersprechen.
Ihre Einstellungen gelten lediglich für diese Website.
MEHR OPTIONENZUSTIMMEN
Sighlent
 * CTF
 * Digital Forensics
 * IoT/IIoT
 * Malware Analysis
 * Network & System Administration
 * OSINT-GLOBAL (Non-US)
 * OSINT-US
 * Pen Testing / Red Team
 * Programming
 * Sighlent's Sources


 * THREAT HUNTING


 * CTF
 * Digital Forensics
 * IoT/IIoT
 * Malware Analysis
 * Network & System Administration
 * OSINT-GLOBAL (Non-US)
 * OSINT-US
 * Pen Testing / Red Team
 * Programming
 * Sighlent's Sources
 * Threat Hunting

Login
Start for free


INTRUSION DETECTION AND PREVENTION

 * aeppert Tool Repo
 * binarypig
 * bro-osquery
 * brosquery
 * Darktrace Antigena Network (commercial)
 * data_hacking
 * ElastAlert
 * ExtraHop Reveal(x) (commercial)
 * HIDS - Kolide Fleet
 * HIDS - osquery
 * HIDS - osquery (Github)
 * HIDS - OSSEC
 * HIDS - Sysdig
 * HIDS - Sysmon
 * HIDS - Velociraptor
 * HIDS - WAZUH
 * HIDS - Zeek Agent
 * IDS - AI Engine
 * IDS - CIFv2
 * IDS - psad
 * IDS - Snort
 * IDS - snort3 (Snort Github)
 * IDS - Suricata
 * IDS - Zeek (Github)
 * IPS - sshwatch
 * Metron
 * OpenSOC
 * RITA
 * SANS NSM IDS Rules
 * Security Onion (VM)
 * SIEM - FIR
 * SIEM - LogESP
 * SIEM - OSSIM
 * SIEM - Prelude
 * SIEM - Sguil
 * SIEM - zeek
 * Sigma
 * StreamAlert
 * Uncoder
 * wr2mem Tool Repo


CYBERSECURITY FRAMEWORKS

 * Dispatch
 * Flare
 * GRR
 * Invoke-ATTACKAPI
 * MITRE ATT&CK Navigator
 * NIST CSF
 * Revoke-Obfuscation
 * Unfetter
 * Workbench


DIGITAL CERTIFICATE SEARCH

 * Censys
 * CertDB
 * crt.sh
 * Digicert
 * DigiCert SSLTools
 * Entrust
 * Google
 * NRC
 * spyse_


THREAT HUNTING COLLABORATION PLATFORMS

 * TheHive


INCIDENT RESPONSE RESOURCES

 * ADHD (VM)
 * BinaryAlert
 * BZAR
 * CimSweep
 * DeepBlueCLI
 * DeTTECT
 * Digital Forensics Tools
 * EQL Analytics Library (eqlib)
 * Event Query Language (EQL)
 * FIR
 * grr
 * Hollows Hunter
 * IR Rescue
 * Immersive-Labs-Sec Tools
 * Log Dissect
 * Loki
 * Meerkat
 * Memoryze
 * MIG
 * mitaka
 * Monitor (macOS)
 * Oriana
 * osquery-configuration
 * OSSEM
 * PowerGRR
 * PowerSponse - Containment & Remediation
 * RedHunt (VM)
 * Redline
 * Regshot
 * Security Onion
 * Sentinel ATT&CK
 * SOAR Community Edition (automated IR)
 * Splunk Add-on for PowerShell
 * Stealth
 * Sysinternals Security Utilities
 * SysMon-config
 * SysMon-modular
 * ThreatHunting
 * Varna
 * VirusTotal Yara
 * Volatility
 * YARA


TIMELINE & INVESTIGATION AIDS

 * 422 South OSIT
 * Aeontimeline
 * CodePlex Archive
 * Danger Zone
 * Draw.io
 * Free-Timeline.com
 * Geo Commons
 * Gephi
 * Gephi GEXF File Format
 * GitHub: MindMup
 * Google spreadsheet charts
 * Graphika.com
 * Linking Open Data
 * Linkurio.us
 * Lucidchart
 * Mindmap Manger - Mindjet
 * MindMup
 * Myhistro
 * neo4j.com
 * NodeExcel
 * Office Timeline
 * Oligrapher
 * Open Data Showroom
 * ORA-LITE
 * OSINT Framework
 * OSINT YOGA
 * Preceden Timeline Maker
 * Processing
 * Quadrigram
 * ScribbleMaps
 * Sentinel Visualiser
 * SmartDraw
 * Spatial.ly
 * Sutori
 * The Ultimate List of Timeline Makers
 * Thetimelineproject
 * Timeglider: web-based timeline software
 * TimeGraphics
 * Timeline Knightlab
 * Timetoast
 * TouchGraph.com
 * VIS Desktop
 * VIS. Visual Investigative Scenarios
 * Visallo: Investigative Data Analysis Tool
 * Visual Capitalist (@VisualCap)
 * Visual.ly
 * WebSequenceDiagrams
 * Wolfram|Alpha
 * XMind - Mind Mapping Software
 * yEd Graph Editor
 * Zotero


REAL-TIME THREAT MAPS

 * Akamai Threat Monitor
 * Arbor Networks DDoS Attack Map
 * BGP Stream
 * Bitdefender Threat Map
 * CheckPoint Live Cyber Attack Threat Map
 * Cymru Malicious Activity Map (RADAR Console)
 * ESET Virus Radar
 * Falcon Sandbox - Intelligence Threatmap
 * FireEye Cyber Threat Map
 * Fortinet Threat Map
 * Internet Traffic Report
 * Kaspersky Cyberthreat Map
 * LookingGlass Threat Map
 * NetScout Cyber Theat Horizon
 * SANS Threat Feed Map
 * Secure List Cyberthreat Statistics
 * SonicWall Security Center
 * Spamhaus Botnet Map
 * Talos intelligence - Top Malware Senders By IP
 * Threatbutt Attack Attribution Map


THREAT INTELLIGENCE

 * abuse.ch
 * AlienVault Open Threat Exchange
 * Attack Maps
 * Augury
 * Bitdefender Advanced Threat Intelligence
 * Center for Internet Security
 * Combine Project
 * Cyber Threat Alliance
 * Cyber45 Threat Intelligence Search
 * ETOpen
 * FireEye
 * Graylog2 - Threat Intel Plugin
 * hashdd (build and search threat feeds)
 * HP Threat Research
 * IBM X-Force Exchange
 * Intel Critical Stack
 * Intel Stack
 * IntelMQ
 * Kaspersky Open Tip
 * KLARA
 * McAffee Threat Landscape Dashboard
 * MISP
 * MS-ISAC Advisories
 * National Cyber Awareness System (CISA)
 * NETSCOUT Threat Intelligence
 * Pulsedive
 * RiskIQ Community
 * SENKI (open source)
 * Shadow Server
 * Threat Crowd
 * threatfeeds.io
 * Tor Bulk Exit List
 * TOR Node List
 * Tor Node Status List
 * WebRoot BrightCloud


LOG AGGREGATION AND DATA ANALYSIS

 * ELK Stack (Elasticsearch, Logstash, Kibana)
 * HELK
 * sof-ELK
 * Splunk


HONEYPOTS & HONEYNETS

 * Amun
 * Awesome Honeypots
 * Bifrozt
 * ConPot
 * Glastopf
 * HoneyDrive
 * HoneyPy
 * HonSSH
 * Kippo
 * Kojoney
 * Project Honeypot
 * T-Pot


INDICATORS OF COMPROMISE (IOC)S

 * Anomali STAXX
 * APTnotes
 * Avast - IoCs
 * Carbon Black - IoCs
 * Citizen Lab IoCs
 * Bitdefender - IoCs
 * botherder/targetedthreats - IoCs
 * Broadcom Attack Signatures
 * Broadcom IoCs
 * CheckPointSW/Cyber-Research - IoCs
 * Cyber45 IoC Database Search
 * DoctorWeb - IoCs
 * ESET IoCs
 * FireEye IoCs
 * Fox-IT · Tools and IoCs
 * GoSecure - IoCs
 * InQuest - Domain Reputation Lookup
 * InQuest - IoCDB
 * InQuest - Yara Rules
 * Intezer - Yara Rules
 * IoC Bucket
 * IoC Editor
 * IoC Finder
 * IoC Writer
 * IoCs Included with Loki
 * ISC SANS IoCs - High
 * ISC SANS IoCs - Medium
 * LOKI Open-Source IOC Scanner
 * Malware Domain List
 * Malware-Traffic-Analysis
 * McAfee ATR - IoCs
 * McAfee ATR -Yara Rules
 * Microsoft - Threat Queries
 * MISP
 * MITRE - APT Groups
 * MITRE - Software
 * Nextron IoCs (Florian Roth)
 * ReversingLabs - Yara Repository
 * Palo Alto Unit42 IoCs
 * Prodaft - IoCs
 * Proofpoint IoCs
 * Pulsedive IoC Search
 * Qi-AnXin RedDrip7 - IoCs
 * rstcloud/rstthreats - IoCs
 * SentinelLabs
 * Sophos - IoCs
 * Sucuri Labs IoCs
 * SpiderLabs - IoCs
 * Sqrrl Threat Hunting Project
 * StrangeRealIntel - IoCs
 * ThreatIngestor
 * Threat Miner
 * Triptych Security IoCs
 * Verizon Security Research & Cyber Intelligence Center
 * Virus Total


NETWORK TRAFFIC ANALYSIS

 * BGP Toolkit
 * Brim
 * Cloudflare IP Ranges
 * Daemon Logger (NSM packet logger)
 * Denyhosts
 * Device Info
 * Fail2ban
 * FILE2PCAP
 * Fingerprinting - FATT
 * Fingerprinting - FingerprinTLS
 * Fingerprinting - GQUIC for Zeek
 * Fingerprinting - HASSH
 * Fingerprinting - JA3
 * Fingerprinting - Mercury
 * Fingerprinting - RDFP
 * Fingerprinting - Recog
 * Geolocation - IP on Map
 * Geolocation - IPfingerprints
 * Geolocation - WhereIs
 * hadoop-pcap
 * https://expired.badssl.com/
 * https://rc4.badssl.com/
 * https://revoked.badssl.com/
 * https://self-signed.badssl.com/
 * IPalyzer
 * Joy
 * Kismet (WiFi)
 * Monitor - fibratus
 * Monitor - httpry
 * Monitor - justsniffer
 * Monitor - Ngrep
 * Monitor - Nodesecurity
 * Monitor - ntopng
 * Monitor - opensnitch
 * Monitor - passivedns
 * Monitor - sagan
 * netcap
 * Netperf
 * Network Forensics - Dshell
 * Network Forensics - Moloch
 * Network Forensics - Openfpc
 * Network Forensics - Spot
 * Network Forensics - stenographer
 * Network Forensics - tcpflow
 * Network Forensics - Xplico
 * RE2PCAP
 * Sniffer - Live HTTP Header
 * Sniffer - Netsniff-ng
 * Sniffer - Wireshark
 * teler
 * wrong.host.badssl.com/


LEARNING RESOURCES & LABS

 * Amazon Web Services Free Tier
 * BOTSv1
 * BOTSv2
 * BOTSv3
 * CALDERA (Threat Simulation)
 * Cobalt Strike (Threat Simulation)
 * CTF Tools
 * CTFlearn
 * CTFtime
 * Cybrary Cybersecurity Training
 * DARPA Cyber Grand Challenge Datasets
 * Exploit Education
 * Immersive Labs (gamified cyber skills platform)
 * Linux Foundation Training
 * Linux Journey
 * MITRE Cyber Academy
 * mordor
 * National Cyber League (subscription req.)
 * Open Tech School (free IT education)
 * Pentester Lab
 * PortSwigger Web Security Academy
 * Pwnable.tw
 * Pwnadventure
 * SANS Cyber FastTrack
 * SANS SEC504 - Windows IR Exercise
 * SecDocs Hacking & Security Documentation
 * SecGen
 * Splunk Attack Range
 * Detection Lab
 * Teachers - Cyber Security Lesson Plans for Kids
 * ----------Reading Materials / How-to-Guides------------------------------
 * Active Directory Threat Hunting
 * Alerting & Detection Strategy Framework
 * Commonly Abused Windows Commands
 * Cyber Threat Hunting
 * Deception as Detection
 * Expert Investigation Guide - Threat Hunting
 * Generating Hypotheses for Successful Threat Hunting
 * Hunt Detect Prevent
 * Hunt Evil
 * Huntpedia
 * McAfee: Restore quarantined file not in the Quarantine Manager
 * MITRE ATT&CK Wiki
 * MITRE CAR
 * SysMon-DFIR
 * The Hunter's Handbook
 * Threat Hunting For Fileless Malware
 * Threat Hunter Playbook
 * Threat Hunting Project
 * TTPs
 * Vulnerabilities Lab | ForAllSecure


FAKE NEWS DETECTION

 * CITIZEN EVIDENCE LAB
 * Duke Reporters' Lab
 * EU vs DISINFORMATION
 * Fact Check
 * Hoax Slayer
 * Hoaxy
 * Review Meta
 * Snopes
 * Truth or Fiction
 * Verification Junkie


MISC. SECURITY RESOURCES

 * Computer Crime Research Archive
 * How to Start in Infosec
 * Infragard Community
 * New to Infosec? Some things to get you started.


 Remove Ads. Go PRO!