APT-Hunter – Threat Hunting Tool via Windows Event Log
APT-Hunter is a threat hunting tool for windows event logs made from the perspective of the purple team mindset to provide detection for APT movements hidden in the sea of windows event logs.
This will help you to decrease the time to uncover suspicious activity and the tool will make good use of the windows event logs collected and make sure to not miss critical events configured to be detected.
The target audience for APT-Hunter is threat hunters, incident response professionals or forensic investigators.
Features of APT-Hunter Threat Hunting Tool
- Provide output with time sketch format to upload it directly and start analyzing the time line
- Events Categorized based Severity to make the filtering easy and focus on what important
- Have A log collection automation script to collect all the required logs to save the time required to export important logs
- Gather and analyze (Sysmon, Security, System, Powershell, Powershell_Operational, ScheduledTask, WinRM, TerminalServices, Windows_Defender)
- This rule tested in many real incidents and provided a great information that reduced the time to detect initial evidence
- Can run on any system thanks to python3, you can do live analysis on the affected system or take the logs offline and analyze them on any system
- Log Parsing and extraction using Regex
- This tool built based on researches published on the internet and testing done by me in order to collect most of the useful use cases in one tool
- Includes more than 60 Use cases along with Security and terminal services logs statistics and more will be added soon . Say good bye to memorizing use cases and SIEM searches
- Now you don’t need to setup instance of SIEM, Log collector solutions to help you parse and extract the required data nor you have to keep looking at sheet with million of events
- Log statistics that will help you uncover the anomaly
- Easy to add new detection rule as the fields clear and syntax easy to use
- Support windows event logs exported as EVTX and CSV
- Analyst can add new malicious executable names directly to list
- Provide output as excel sheet with every Log as work sheet
Using APT-Hunter Threat Hunting Tool
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 |
# python3 APT-Hunter.py -h usage: APT-Hunter.py [-h] [-p PATH] [-o OUT] [-t {csv,evtx}] -h, --help show this help message and exit -p PATH, --path PATH path to folder containing windows event logs generated by the APT-Hunter-Log-Collector.ps1 -o OUT, --out OUT output file name -t {csv,evtx}, --type {csv,evtx} csv ( logs from get-eventlog or windows event log GUI or logs from Get-WinEvent ) , evtx ( EVTX extension windows event log ) --security SECURITY Path to Security Logs --system SYSTEM Path to System Logs --scheduledtask SCHEDULEDTASK Path to Scheduled Tasks Logs --defender DEFENDER Path to Defender Logs --powershell POWERSHELL Path to Powershell Logs --powershellop POWERSHELLOP Path to Powershell Operational Logs --terminal TERMINAL Path to TerminalServices LocalSessionManager Logs --winrm WINRM Path to Winrm Logs --sysmon SYSMON Path to Sysmon Logs -p : provide path to directory containing the extracted using the powershell log collectors ( windows-log-collector-full-v3-CSV.ps1 , windows-log-collector-full-v3-EVTX.ps1 ) . -o : name of the project which will be used in the generated output sheets -t : the log type if its CSV or EVTX |
You can download APT-Hunter here:
Linux: APT-Hunter-nix.zip
Windows: APT-Hunter_Windows.zip
Source: v1.0-beta.zip
Or read more here.
GitLab Watchman – Audit Gitlab For Sensitive Data & Credentials
GitLab Watchman is an application that uses the GitLab API to audit GitLab for sensitive data and credentials exposed internally – this includes code, commits, wiki pages and more.
GitLab Watchman searches GitLab for internally shared projects and looks at:
- Code
- Commits
- Wiki pages
- Issues
- Merge requests
- Milestones
For the following data:
- GCP keys and service account files
- AWS keys
- Azure keys and service account files
- Google API keys
- Slack API tokens & webhooks
- Private keys (SSH, PGP, any other misc private key)
- Exposed tokens (Bearer tokens, access tokens, client_secret etc.)
- S3 config files
- Passwords in plaintext
- CICD variables exposed publicly
- and more
Using GitLab Watchman to Audit Gitlab For Sensitive Data
GitLab Watchman will be installed as a global command, use as follows:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 |
usage: gitlab-watchman [-h] --timeframe {d,w,m,a} --output {file,stdout,stream} [--version] [--all] [--blobs] [--commits] [--wiki-blobs] [--issues] [--merge-requests] [--milestones] [--comments] Monitoring GitLab for sensitive data shared publicly optional arguments: -h, --help show this help message and exit --version show program's version number and exit --all Find everything --blobs Search code blobs --commits Search commits --wiki-blobs Search wiki blobs --issues Search issues --merge-requests Search merge requests --milestones Search milestones --comments Search comments required arguments: --timeframe {d,w,m,a} How far back to search: d = 24 hours w = 7 days, m = 30 days, a = all time --output {file,stdout,stream} Where to send results |
You can run GitLab Watchman to look for everything, and output to default Stdout:
1 |
gitlab-watchman --timeframe a --all |
Or arguments can be grouped together to search more granularly. This will look for commits and milestones for the last 30 days, and output the results to a TCP stream:
1 |
gitlab-watchman --timeframe m --commits --milestones --output stream |
Logging in GitLab Watchman to Audit Gitlab For Sensitive Data
GitLab Watchman gives the following logging options:
- Log file
- Stdout
- TCP stream
Results are output in JSON format, perfect for ingesting into a SIEM or other log analysis platform.
For file and TCP stream logging, configuration options need to be passed via .conf file or environment variable. See the file docs/logging.md for instructions on how to set it up.
If no logging option is given, GitLab Watchman defaults to Stdout logging.
You can download Gitlab Watchman here:
Or read more here.
GKE Auditor – Detect Google Kubernetes Engine Misconfigurations
GKE Auditor is a Java-based tool to detect Google Kubernetes Engine misconfigurations, it aims to help security and development teams streamline the configuration process and save time looking for generic bugs and vulnerabilities.
The tool consists of individual modules called Detectors, each scanning for a specific vulnerability.
Installing and Using GKE Auditor to Detect Google Kubernetes Engine Misconfigurations
Installation
1 2 3 |
git clone https://github.com/google/gke-auditor cd ./gke-auditor/ ./build.sh |
Usage
The tool has to be built by running the build.sh
script first.
Once the tool is built, it can be run using the auditor.sh
script, using the following options:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 |
./auditor.sh [-a] [-ast] [-c] [-d] [-h] [-i <arg>] [-p <arg>] [-q] [-r <arg>] -a,--all Run all detectors. -ast,--assets Run all detectors for each individual asset. -c,--color Turns on tool output coloring. -d,--defaults Runs detectors including Kubernetes default assets. Disabled by default. -h,--help Print help information. -i,--iso <arg> Run Node Isolation detectors. To run all detectors, omit the argument list. To specify individual detectors to run, give a list of indices: 1. NODE_SELECTOR_POD_REJECTED 2. NODE_TAINTS_POD_REJECTED 3. NODE_AFFINITY_POD_REJECTED -p,--psp <arg> Run PSP (Pod Security Policy) detectors. To run all detectors, omit the argument list. To specify individual detectors to run, give a list of indices: 1. PRIVILEGED_CONTAINERS 2. CONTAINERS_SHARING_HOST_PROCESS_ID_NAMESPACE 3. CONTAINERS_SHARING_HOST_IPC 4. CONTAINER_SHARING_HOST_NETWORK_NAMESPACE 5. CONTAINERS_ALLOW_PRIVILEGE_ESCALATION 6. ROOT_CONTAINERS_ADMISSION 7. CONTAINERS_NET_RAW_CAPABILITY 8. CONTAINERS_ADDED_CAPABILITIES 9. CONTAINERS_CAPABILITIES_ASSIGNED -q,--quiet Prints out only misconfigurations, without additional detector info. Disabled by default. -r,--rbac <arg> Run RBAC (Role Based Access Control) detectors. To run all detectors, omit the argument list. To specify individual detectors to run, give a list of indices: 1. CLUSTER_ADMIN_ROLE_USED 2. SECRET_ACCESS_ALLOWED 3. WILDCARD_USED 4. CREATE_PODS_ALLOWED 5. AUTOMOUNT_SERVICE_ACCOUNT_TOKEN_ENABLED 6. ESCALATING_RESOURCES_REPORT |
General Detector Output Format for GKE Auditor
You can download GKE Auditor here:
Or read more here.
zANTI – Android Wireless Hacking Tool Free Download
zANTI is an Android Wireless Hacking Tool that functions as a mobile penetration testing toolkit that lets you assess the risk level of a network using your mobile device for free download.
This easy to use mobile toolkit enables IT Security Administrators to simulate an advanced attacker to identify the malicious techniques they use in the wild to compromise the corporate network.
Features of zANTI Android Wireless Hacking Tool
This network auditor comes along with a rather simple interface compared to other solutions and running its tasks is pretty straightforward. These are its main features:
Scan
Conduct network scans, in different intensity levels in order to identify connected devices, their properties and their vulnerabilities.
Diagnose
Enable Security Officers to easily evaluate an organization’s network and automatically diagnose vulnerabilities within mobile devices or web sites using a host of penetration tests including, man-in-the-Middle (MITM), password cracking and Metasploit.
Report
Highlight security gaps in your existing network and mobile defences and report the results with advanced cloud-based reporting through zConsole. zANTI mirrors the methods a cyber-attacker can use to identify security holes within your network. Dash-board reporting enables businesses to see the risks and take appropriate corrective actions to fix critical security issues.
Installing zANTI Android Wireless Hacking Tool
Minimum operating system requirements: Android 4.0.
The installation of the app by means of the APK file requires the activation of the “Unknown sources” option within Settings>Applications.
You can download zANTI here – the password is darknet123!
–
Or read more here.

HELK – Open Source Threat Hunting Platform
The Hunting ELK or simply the HELK is an Open-Source Threat Hunting Platform with advanced analytics capabilities such as SQL declarative language, graphing, structured streaming, and even machine learning via Jupyter notebooks and Apache Spark over an ELK stack. This project was developed primarily for research, but due to its flexible design and core components, […]

Trape – OSINT Analysis Tool For People Tracking
Trape is an OSINT analysis tool, which allows people to track and execute intelligent social engineering attacks in real-time. It was created with the aim of teaching the world how large Internet companies could obtain confidential information. Example types of information are the status of sessions of their websites or services and control their users […]