Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.
☆16May 21, 2021Updated 4 years ago
Alternatives and similar repositories for TheWatchList
Users that are interested in TheWatchList are comparing it to the libraries listed below
Sorting:
- Small-scale threat emulation and detection range built on Elastic and Atomic Redteam.☆39Dec 17, 2025Updated 2 months ago
- ☆25Jun 25, 2021Updated 4 years ago
- Cybersecurity Ontology (CyberOnto) and Situational Awareness (CyberSA) help teamwork in Cyber Incident Responses, Control, Containment, a…☆10Sep 15, 2022Updated 3 years ago
- 🦉🔬A small PowerShell tool for finding information quickly on malicious IPs or FQDNs. Powershell threat hunting.☆11Jan 9, 2020Updated 6 years ago
- Threat Detection & Anomaly Detection rules for popular open-source components☆53Jul 27, 2022Updated 3 years ago
- Bring Your Own Mitre Att&ck © Matrix !☆13Oct 19, 2023Updated 2 years ago
- Defensive S3 Bucket Squating☆31Jan 18, 2018Updated 8 years ago
- Burp extension to find and decode BigIP and Netscaler cookies☆15Jul 20, 2018Updated 7 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆17Dec 9, 2017Updated 8 years ago
- Get URLs from the Wayback Machine. Able to handle large outputs.☆35Sep 15, 2023Updated 2 years ago
- A simple, minimal C# windows service implementation that can be used to demonstrate privilege escalation from misconfigured windows servi…☆16Sep 4, 2015Updated 10 years ago
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆49Nov 11, 2022Updated 3 years ago
- Continuous Reconnaissance and Vulnerability Scanning for Bug Bounties☆18Jun 6, 2024Updated last year
- 这是一个从黑暗搜索引擎 搜索查找存在此反序列化漏洞 的批量检测脚本☆11Feb 23, 2023Updated 3 years ago
- Repository of tools, YARA rules, and code-snippets from Stairwell's research team.☆23Jan 31, 2024Updated 2 years ago
- ☆20Jan 12, 2022Updated 4 years ago
- A curated list of resources to deep dive into the intersection of applied machine learning and threat detection.☆19Sep 23, 2020Updated 5 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Jan 8, 2024Updated 2 years ago
- GCP and GSUITE security auditing scripts☆27Apr 29, 2024Updated last year
- This repository contains OpenIOC rules to aid in hunting for indicators of compromise and TTPs focused on Advanced Persistent Threat grou…☆26Oct 3, 2023Updated 2 years ago
- intrusion detection☆26Jun 14, 2017Updated 8 years ago
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆60Mar 12, 2022Updated 3 years ago
- list of all the pastebins across all protocols (Tor, ZeroNet, etc.)☆43Nov 18, 2019Updated 6 years ago
- A script to collect (the most famous) Yara rules from more than 150 free resources. Free alternative to: https://valhalla.nextron-system…☆28Aug 26, 2023Updated 2 years ago
- One Day of Python for SaintCon 2022☆11Jan 3, 2023Updated 3 years ago
- My Python Cookiecutter project template☆32Sep 6, 2022Updated 3 years ago
- IP-ASN-history is a server software to store efficiently the history of BGP announces and quickly lookup IP addresses origins☆45Apr 1, 2022Updated 3 years ago
- Detect-X Automated Threat Detection by AI☆32Oct 10, 2019Updated 6 years ago
- PowerShell scripts☆11Feb 19, 2018Updated 8 years ago
- An application that displays a map and graphs showing solar irradiance forecasts in solar farms in Georgia using data from the National S…☆10Oct 15, 2021Updated 4 years ago
- A library and command line tool for extracting indicators of compromise (IOCs) from security reports in PDF, HTML, Word, or text format☆49Dec 22, 2025Updated 2 months ago
- Website crawler with YARA detection☆89Aug 20, 2023Updated 2 years ago
- discover IP ranges. check email security. survey domains.☆40Mar 9, 2023Updated 2 years ago
- Home of the cross-plat Get-NetStat replacement for the old netstat.exe utility on Windows☆31Jan 15, 2021Updated 5 years ago
- List of sources for cybersecurity news☆41Dec 16, 2022Updated 3 years ago
- This repository contains Splunk queries to hunt some anomalies☆46Jul 28, 2022Updated 3 years ago
- Sightings Ecosystem gives cyber defenders visibility into what adversaries actually do in the wild. With your help, we are tracking MITRE…☆38May 28, 2025Updated 9 months ago
- Useful links, scripts, tools and best practice for PowerShell☆36Oct 12, 2018Updated 7 years ago
- CIRCL system forensic tools or a jumble of tools to support forensic☆41Jan 20, 2023Updated 3 years ago