P3t3rp4rk3r / Threat_IntelligenceView external linksLinks
Threat-Intelligence Feeds & Tools & Frameworks
☆223Jun 7, 2024Updated last year
Alternatives and similar repositories for Threat_Intelligence
Users that are interested in Threat_Intelligence are comparing it to the libraries listed below
Sorting:
- TIH is an intelligence tool that helps you in searching for IOCs across multiple openly available security feeds and some well known APIs…☆157Jun 13, 2025Updated 8 months ago
- Threat Intelligence APIs☆282Aug 14, 2023Updated 2 years ago
- Cyber Threat Intelligence Feeds☆98Sep 26, 2016Updated 9 years ago
- Personal compilation of APT malware from whitepaper releases, documents and own research☆266Feb 7, 2019Updated 7 years ago
- Your Everyday Threat Intelligence☆1,949Updated this week
- Zeek-Formatted Threat Intelligence Feeds☆384Updated this week
- A curated list of Awesome Threat Intelligence resources☆9,786Jan 19, 2026Updated 3 weeks ago
- Extract and aggregate threat intelligence.☆902Jan 31, 2024Updated 2 years ago
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,475Jan 12, 2026Updated last month
- Tool to gather Threat Intelligence indicators from publicly available sources☆658Mar 14, 2019Updated 6 years ago
- A collection of resources for Threat Hunters☆914Oct 15, 2024Updated last year
- Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups☆724Dec 26, 2022Updated 3 years ago
- A curated list of the most important and useful resources about Threat Detection,Hunting and Intelligence.☆575Mar 24, 2023Updated 2 years ago
- CLI tool for open source and threat intelligence☆1,255Feb 27, 2025Updated 11 months ago
- Awesome list of keywords and artifacts for Threat Hunting sessions☆633Aug 4, 2025Updated 6 months ago
- Multithreaded threat Intelligence gathering built with Python3☆177Jan 23, 2018Updated 8 years ago
- TTPMapper is an AI-driven threat intelligence parser that converts unstructured reports whether from web URLs or PDF files into structure…☆49Jun 21, 2025Updated 7 months ago
- Malcom - Malware Communications Analyzer☆1,165Nov 29, 2017Updated 8 years ago
- Documentation and Sharing Repository for ThreatPinch Lookup Chrome & Firefox Extension☆377Sep 8, 2018Updated 7 years ago
- A Project dedicated to documenting various attack and detection vectors that can be encountered within Google Cloud Platform (GCP).☆60Apr 10, 2024Updated last year
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆102Jul 10, 2025Updated 7 months ago
- ☆138Apr 20, 2023Updated 2 years ago
- This repo is where I store my Threat Hunting ideas/content☆88May 9, 2023Updated 2 years ago
- Public Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchers☆768Feb 8, 2026Updated last week
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,313Jan 22, 2025Updated last year
- Cyber Threat Intelligence - Toolbox☆52Oct 8, 2018Updated 7 years ago
- Indicator of Compromise Mapping Service☆12Apr 15, 2014Updated 11 years ago
- My logstash plugins. Filter: sig (for security detect -> IOC, sig, New value, Reference, link, frequence, ...). Output: alert created by …☆10Jul 26, 2019Updated 6 years ago
- ☆12Feb 9, 2025Updated last year
- Detect Tactics, Techniques & Combat Threats☆2,262Jan 21, 2026Updated 3 weeks ago
- Machinae Security Intelligence Collector☆538May 15, 2024Updated last year
- #ThreatHunting #DFIR #Malware #Detection Mind Maps☆304Nov 13, 2021Updated 4 years ago
- ✨ A curated list of awesome threat detection and hunting resources 🕵️♂️☆4,496Jan 5, 2026Updated last month
- A list of cyber-chef recipes and curated links☆2,182Jun 14, 2024Updated last year
- Malwoverview is a rapid response tool used to gather intelligence information from VirusTotal, Hybrid Analysis, URLHaus, Polyswarm, Malsh…☆3,535Jan 20, 2026Updated 3 weeks ago
- A very fast network scanner of SSL server configurations☆11Mar 28, 2016Updated 9 years ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆127Apr 6, 2024Updated last year
- ☆12Jun 29, 2021Updated 4 years ago
- Incident response teams usually working on the offline data, collecting the evidence, then analyze the data☆45Jan 2, 2022Updated 4 years ago