Proofpoint - Emerging Threats - Threat Research tools + publicly shared intel and documentation
☆86Mar 17, 2026Updated last week
Alternatives and similar repositories for threatresearch
Users that are interested in threatresearch are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆22Dec 22, 2020Updated 5 years ago
- Script to pull newly-registered domains and check for similarity against a provided word list.☆13Aug 2, 2020Updated 5 years ago
- BSidesLV 2015 Exploit Kit Analysis Workshop Files☆27Aug 5, 2015Updated 10 years ago
- Repository for scripts and tips for "Yara Scan Service"☆20Feb 19, 2023Updated 3 years ago
- Simple IP enrichment service and API wrapping PyASN and MaxMind GeoIP.☆71Dec 8, 2022Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A collection of YARA signatures that I have found around the web.☆11Apr 29, 2016Updated 9 years ago
- ☆16Dec 5, 2023Updated 2 years ago
- Enables dynamic translation of structured data between formats☆14Dec 14, 2018Updated 7 years ago
- Malware Configuration And Payload Extraction☆761Nov 22, 2024Updated last year
- 进程内优雅地拦截SPI/LSP模块。 Manage SPI/LSP in a graceful way within private process.☆11Dec 28, 2017Updated 8 years ago
- Yara rules☆22Mar 27, 2023Updated 3 years ago
- ☆16Mar 20, 2026Updated last week
- DC3 Malware Configuration Parser (DC3-MWCP) is a framework for parsing configuration information from malware. The information extracted …☆341Feb 7, 2025Updated last year
- Volatility plugin for extracts configuration data of known malware☆495Dec 22, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Malware Sinkhole List in various formats☆104Jul 6, 2022Updated 3 years ago
- ☆52Sep 5, 2018Updated 7 years ago
- Kippo configured to be a backdoored netscreen☆11Dec 22, 2015Updated 10 years ago
- A Passive DNS backend and collector☆33Jul 16, 2022Updated 3 years ago
- Rudimentary IP and URL threat feeds sourced from The Fakelabs Project.☆10Dec 13, 2025Updated 3 months ago
- ☆15Nov 29, 2017Updated 8 years ago
- Cerebrate is an open-source platform meant to act as a trusted contact information provider and interconnection orchestrator for other se…☆91Mar 11, 2026Updated 2 weeks ago
- 🚧 Currently transfering TLP:CLEAR rules from TLP:AMBER repository...☆21Mar 22, 2024Updated 2 years ago
- Automatically created C2 Feeds☆668Updated this week
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ☆21Apr 19, 2024Updated last year
- ☆18Jan 14, 2026Updated 2 months ago
- Ursnif beacon decryptor☆27Mar 20, 2023Updated 3 years ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆150Sep 22, 2023Updated 2 years ago
- Unpack MIME attachments from a file and check them against virustotal.com☆44Mar 11, 2016Updated 10 years ago
- Tools for playing w/ CobaltStrike config - extractin, detection, processing, etc...☆28Apr 13, 2023Updated 2 years ago
- IOCs for various malware families☆11Jul 18, 2024Updated last year
- Programmatically access a TLS certificate chain in C++ and C#☆12Oct 27, 2018Updated 7 years ago
- A golang implementation of a prefetch parser.☆20Oct 27, 2025Updated 5 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆53Mar 16, 2018Updated 8 years ago
- The Purpose of this research tool is to provide a Python client into RiskIQ API services.☆22Feb 4, 2021Updated 5 years ago
- Automatically create YARA rules from malicious documents.☆211May 16, 2022Updated 3 years ago
- Script to parse first load time for Shell Extensions loaded by user. Also enumerates all loaded Shell Extensions that are only installed …☆21Jun 8, 2015Updated 10 years ago
- Manage VT Alerts☆62Oct 4, 2016Updated 9 years ago
- Thor Artifacts for Velociraptor☆19Dec 2, 2025Updated 3 months ago
- ☆17Mar 22, 2018Updated 8 years ago