EndlessFractal / Threat-Intel-FeedLinks
Automated threat intel feed parsing and consolidationπ»πΎπ€
β34Updated this week
Alternatives and similar repositories for Threat-Intel-Feed
Users that are interested in Threat-Intel-Feed are comparing it to the libraries listed below
Sorting:
- On demand query API for https://github.com/davidonzo/Threat-Intel project.β57Updated last year
- Data breaches, Leaks, Malwares Forums List <Please Use Vpn/TOR don't click on Link directly bad OPSEC>β53Updated 2 weeks ago
- β53Updated last month
- Turn any blog into structured threat intelligence.β38Updated 2 weeks ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.β62Updated last year
- Data from Dark Web Marketplace scraping - Be carefulβ41Updated 11 months ago
- Building a consolidated RSS feed for articles about cyberattacksβ72Updated this week
- β34Updated this week
- URL fingerprinting made easyβ89Updated last year
- AIL project training materialsβ35Updated 2 months ago
- An experimental Velociraptor implementation using cloud infrastructureβ26Updated last week
- Computes the hashes of a favicon file and provides the search syntax for Shodan, Censys and Zoomeyeβ51Updated last year
- Sigma detection rules for hunting with the threathunting-keywords projectβ56Updated 7 months ago
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users inβ¦β31Updated last month
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.β69Updated last year
- Signature based honeypot detector tool written in Golangβ104Updated 6 months ago
- Scripts for importing threat feeds and CTI articles, blogs, and reports into MISP.β17Updated 3 months ago
- Ransomware groups postsβ42Updated this week
- yara detection rules for hunting with the threathunting-keywords projectβ149Updated 4 months ago
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.β52Updated 11 months ago
- Can you pay the ransom in your country?β15Updated last year
- Collection of videos of Raids on Cybercriminalsβ20Updated 6 months ago
- Tor onion address lookupβ55Updated last month
- Helping Incident Responders hunt for potential persistence mechanisms on UNIX-based systems.β17Updated last year
- Library of threat hunts to get any user started!β45Updated 5 years ago
- Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigationsβ43Updated 3 years ago
- Repo for experimenting and testing MCP server builds for CTI-related research.β27Updated 4 months ago
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitionersβ108Updated 11 months ago
- Cyber threat intelligence tool suite.β42Updated 6 months ago
- Domain Response is a tool that is designed to help you automate the investigation for a domain. This tool is specificly designed to automβ¦β49Updated last month