A collection of companies that disclose adversary TTPs after they have been breached
☆300May 11, 2026Updated last week
Alternatives and similar repositories for Breach-Report-Collection
Users that are interested in Breach-Report-Collection are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Collection of videos of Raids on Cybercriminals☆22Mar 19, 2025Updated last year
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆60Oct 28, 2022Updated 3 years ago
- Hashes of infamous malware☆26Jul 10, 2023Updated 2 years ago
- An experimental script to perform bulk parsing of arbitrary file features with YARA and console logging.☆21Nov 13, 2022Updated 3 years ago
- This repository contains Open Source freely usable Threat Intel feeds that can be used without additional requirements. Contains multiple…☆835Updated this week
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆119Oct 29, 2024Updated last year
- Practice CTI Quiz☆13Mar 20, 2024Updated 2 years ago
- A resource containing all the tools each ransomware gangs uses☆1,367May 11, 2026Updated last week
- The Threat Actor Profile Guide for CTI Analysts☆120Jul 15, 2023Updated 2 years ago
- ✨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The …☆292Feb 5, 2024Updated 2 years ago
- Map tracking ransomware, by OCD World Watch team☆487Feb 20, 2026Updated 3 months ago
- A collection of papers, blogs, and resources that make up the quintessential aspects of cyber threat intelligence☆722Apr 25, 2026Updated 3 weeks ago
- A curated list of Awesome Threat Intelligence Blogs☆542Apr 27, 2026Updated 3 weeks ago
- This is a collection of threat detection rules / rules engines that I have come across.☆300May 5, 2024Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- This project aims to bridge the gap between Microsoft Attack Surface Reduction (ASR) rules and MITRE ATT&CK by mapping ASR rules to their…☆29Nov 20, 2024Updated last year
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.☆339May 7, 2026Updated 2 weeks ago
- This repository contains OpenIOC rules to aid in hunting for indicators of compromise and TTPs focused on Advanced Persistent Threat grou…☆26Oct 3, 2023Updated 2 years ago
- USN Journal full path builder☆69Apr 16, 2026Updated last month
- Live Feed of C2 servers, tools, and botnets☆775Apr 13, 2026Updated last month
- ☆170Sep 30, 2025Updated 7 months ago
- Awesome list of keywords and artifacts for Threat Hunting sessions☆655Aug 4, 2025Updated 9 months ago
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆289Mar 20, 2025Updated last year
- ☆164Apr 6, 2026Updated last month
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.