Standard-Format Threat Intelligence Feeds
☆127Mar 4, 2026Updated this week
Alternatives and similar repositories for Public-Intelligence-Feeds
Users that are interested in Public-Intelligence-Feeds are comparing it to the libraries listed below
Sorting:
- Zeek-Formatted Threat Intelligence Feeds☆385Feb 25, 2026Updated last week
- Utilizing your Threat data from a MISP instance into CarbonBlack Response by exposing the data in the Threat Intelligence Feed.☆20May 25, 2022Updated 3 years ago
- Automatically created C2 Feeds☆666Updated this week
- ☆35Nov 11, 2025Updated 3 months ago
- A collection of Cortex Analyzers and Responders for TheHive/Cortex☆13Jan 29, 2020Updated 6 years ago
- SACTI - Securely aggregate CTI sightings and report them on MISP☆14Oct 24, 2022Updated 3 years ago
- The Enhanced MITRE ATT&CK® Coverage Tracker is an Excel tool for SOCs to measure and improve detection coverage of cyber threats. It simp…☆34Nov 13, 2025Updated 3 months ago
- A list of JARM hashes for different ssl implementations used by some C2/red team tools.☆144Apr 20, 2023Updated 2 years ago
- A Modular MWDB Utility to Collect Fresh Malware Samples☆34May 17, 2021Updated 4 years ago
- ☆52Aug 19, 2025Updated 6 months ago
- pyJARM is a library for doing JARM fingerprinting using python☆50Mar 23, 2025Updated 11 months ago
- A collection of tips for using MISP.☆76Dec 11, 2024Updated last year
- A complete system to deploy functional Honeypots to all infrastructures that needs to be notified when something anomalous occur☆10Feb 8, 2022Updated 4 years ago
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆208Jul 21, 2022Updated 3 years ago
- Web interface to IntelMQ☆10Sep 10, 2025Updated 5 months ago
- STIG FireFox the Easy Way☆15Jul 26, 2024Updated last year
- ☆96May 5, 2025Updated 10 months ago
- Ansible VMware Collection☆36Jan 23, 2026Updated last month
- Daily updated malware indicator lists from TR-CERT (USOM), including parsed malicious URLs, IPs, and domains.☆15Updated this week
- A list of JARM fingerprints from malicious IPs, matched against known C2 fingerprints.☆12Jun 9, 2025Updated 8 months ago
- Series of JS scripts to run autonomously for the popular bitcoin gamling site coinscrash.com☆10Apr 11, 2023Updated 2 years ago
- Is a portable forensic tool for analyzing Windows logs, pre-organized according to the methodology outlined in this job: https://cybersec…☆15Jul 19, 2025Updated 7 months ago
- My logstash plugins. Filter: sig (for security detect -> IOC, sig, New value, Reference, link, frequence, ...). Output: alert created by …☆10Jul 26, 2019Updated 6 years ago
- ☆10Dec 24, 2022Updated 3 years ago
- ☆13May 30, 2025Updated 9 months ago
- Simple Script to Help You Find All Files Has Been Modified, Accessed, and Created In A Range Time.☆27Dec 1, 2022Updated 3 years ago
- Indicators of Compromise (IOCs) accompanying HP Threat Research blog posts and reports.☆29Apr 10, 2024Updated last year
- Active C2 IoCs☆99Nov 28, 2022Updated 3 years ago
- Code and yara rules to detect and analyze Cobalt Strike☆272May 5, 2021Updated 4 years ago
- Repository of Yara rules created by the Stratosphere team☆29Jul 8, 2021Updated 4 years ago
- Ubuntu 24.04 CIS Benchmark Hardening Script☆32Jan 23, 2026Updated last month
- Sireus - SRE Utility System - Decision System for tracking SRE and DevOps operational state and executing commands☆14Feb 24, 2023Updated 3 years ago
- Microsoft Sentinel, Defender for Endpoint - KQL Detection Packs☆55Jul 20, 2023Updated 2 years ago
- Kaseya REvil CNC domains☆12Jan 30, 2024Updated 2 years ago
- Power-Forensics is the Best Friend for Incident Responders to perform IR and collect evidences for Linux based host☆12Jun 2, 2023Updated 2 years ago
- This repository contains advanced threat hunting scripts for Cisco Secure Endpoint API. The scripts leverage the AMP API to hunt for thre…☆14Jun 28, 2025Updated 8 months ago
- cryptam document malware analysis tool☆12Jun 18, 2023Updated 2 years ago
- This repository contains Open Source freely usable Threat Intel feeds that can be used without additional requirements. Contains multiple…☆773Jan 28, 2025Updated last year
- Sigma detection rules for hunting with the threathunting-keywords project☆58Mar 2, 2025Updated last year