Proofpoint - Emerging Threats - Threat Research tools + publicly shared intel and documentation
☆88Mar 17, 2026Updated last month
Alternatives and similar repositories for threatresearch
Users that are interested in threatresearch are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆22Dec 22, 2020Updated 5 years ago
- Script to pull newly-registered domains and check for similarity against a provided word list.☆13Aug 2, 2020Updated 5 years ago
- BSidesLV 2015 Exploit Kit Analysis Workshop Files☆27Aug 5, 2015Updated 10 years ago
- Repository for scripts and tips for "Yara Scan Service"☆20Feb 19, 2023Updated 3 years ago
- Simple IP enrichment service and API wrapping PyASN and MaxMind GeoIP.☆71Dec 8, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A Golang API for TheHive☆13Sep 3, 2020Updated 5 years ago
- A collection of YARA signatures that I have found around the web.☆11Apr 29, 2016Updated 10 years ago
- ☆16Dec 5, 2023Updated 2 years ago
- Enables dynamic translation of structured data between formats☆14Dec 14, 2018Updated 7 years ago
- Malware Configuration And Payload Extraction☆760Nov 22, 2024Updated last year
- 进程内优雅地拦截SPI/LSP模块。 Manage SPI/LSP in a graceful way within private process.☆11Dec 28, 2017Updated 8 years ago
- Yara rules☆21Mar 27, 2023Updated 3 years ago
- ☆16Mar 20, 2026Updated last month
- DC3 Malware Configuration Parser (DC3-MWCP) is a framework for parsing configuration information from malware. The information extracted …☆343May 1, 2026Updated last week
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Volatility plugin for extracts configuration data of known malware☆496Dec 22, 2023Updated 2 years ago
- ☆28Dec 28, 2017Updated 8 years ago
- Malware Sinkhole List in various formats☆104Apr 25, 2026Updated 2 weeks ago
- ☆52Sep 5, 2018Updated 7 years ago
- A Passive DNS backend and collector☆33Jul 16, 2022Updated 3 years ago
- Rudimentary IP and URL threat feeds sourced from The Fakelabs Project.☆10Dec 13, 2025Updated 4 months ago
- ☆15Nov 29, 2017Updated 8 years ago
- Cerebrate is an open-source platform meant to act as a trusted contact information provider and interconnection orchestrator for other se…☆92Apr 7, 2026Updated last month
- 🚧 Currently transfering TLP:CLEAR rules from TLP:AMBER repository...☆21Mar 22, 2024Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Useful Windows and AD tools☆15Feb 20, 2022Updated 4 years ago
- Automatically created C2 Feeds☆679Updated this week
- ☆21Apr 19, 2024Updated 2 years ago
- ☆18Jan 14, 2026Updated 3 months ago
- Ursnif beacon decryptor☆27Mar 20, 2023Updated 3 years ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆150Sep 22, 2023Updated 2 years ago
- Unpack MIME attachments from a file and check them against virustotal.com☆44Mar 11, 2016Updated 10 years ago
- Tools for playing w/ CobaltStrike config - extractin, detection, processing, etc...☆28Apr 13, 2023Updated 3 years ago
- IOCs for various malware families☆11Jul 18, 2024Updated last year
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Programmatically access a TLS certificate chain in C++ and C#☆12Oct 27, 2018Updated 7 years ago
- A golang implementation of a prefetch parser.☆20Oct 27, 2025Updated 6 months ago
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆53Mar 16, 2018Updated 8 years ago
- Automatically create YARA rules from malicious documents.☆211May 16, 2022Updated 3 years ago
- Script to parse first load time for Shell Extensions loaded by user. Also enumerates all loaded Shell Extensions that are only installed …☆21Jun 8, 2015Updated 10 years ago
- Manage VT Alerts☆62Oct 4, 2016Updated 9 years ago
- Thor Artifacts for Velociraptor☆19Dec 2, 2025Updated 5 months ago