EndlessFractal / Threat-Intel-FeedLinks
Automated threat intel feed parsing and consolidation💻👾🤖
☆39Updated this week
Alternatives and similar repositories for Threat-Intel-Feed
Users that are interested in Threat-Intel-Feed are comparing it to the libraries listed below
Sorting:
- ☆52Updated 4 months ago
- Turn any blog into structured threat intelligence.☆43Updated last week
- Domain Response is a tool that is designed to help you automate the investigation for a domain. This tool is specificly designed to autom…☆50Updated 4 months ago
- AIL project training materials☆38Updated 5 months ago
- Repo for experimenting and testing MCP server builds for CTI-related research.☆27Updated 7 months ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆63Updated last year
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆69Updated 2 years ago
- On demand query API for https://github.com/davidonzo/Threat-Intel project.☆57Updated last year
- ☆34Updated last month
- Building a consolidated RSS feed for articles about cyberattacks☆72Updated this week
- Scripts for importing threat feeds and CTI articles, blogs, and reports into MISP.☆18Updated 6 months ago
- Newly registered Domain Monitoring to detect phishing and brand impersonation with subdomain enumeration and source code scraping☆63Updated 2 months ago
- Signature based honeypot detector tool written in Golang☆107Updated 9 months ago
- This script enhances endpoint logging telemetry for the purpose of advanced malware threat detection or for building detections or malwar…☆37Updated 8 months ago
- Sigma detection rules for hunting with the threathunting-keywords project☆57Updated 9 months ago
- Data breaches, Leaks, Malwares Forums List <Please Use Vpn/TOR don't click on Link directly bad OPSEC>☆58Updated 3 months ago
- Data from Dark Web Marketplace scraping - Be careful☆42Updated last year
- ☆101Updated 2 weeks ago
- Rapid7 Labs operates as the division of Rapid7 focused on threat research. It is renowned for providing comprehensive threat intelligence…☆73Updated 2 weeks ago
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.☆53Updated last year
- Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations☆45Updated 4 years ago
- 🛡️ VIPER: Stay ahead of threats with AI-driven vulnerability intelligence. Prioritize CVEs effectively using NVD, EPSS, CISA KEV, and Go…☆81Updated 4 months ago
- Import CrowdStrike Threat Intelligence into your instance of MISP☆49Updated 6 months ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆60Updated 3 years ago
- Helping Incident Responders hunt for potential persistence mechanisms on UNIX-based systems.☆17Updated 2 years ago
- MS Graph Commands and Tools for Blue Teamers☆52Updated 2 years ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆66Updated 3 years ago
- TTPMapper is an AI-driven threat intelligence parser that converts unstructured reports whether from web URLs or PDF files into structure…☆48Updated 6 months ago
- Tor onion address lookup☆58Updated 4 months ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆54Updated last year