Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.
☆16May 21, 2021Updated 4 years ago
Alternatives and similar repositories for TheWatchList
Users that are interested in TheWatchList are comparing it to the libraries listed below
Sorting:
- Small-scale threat emulation and detection range built on Elastic and Atomic Redteam.☆39Dec 17, 2025Updated 3 months ago
- ☆26Jun 25, 2021Updated 4 years ago
- Threat Detection & Anomaly Detection rules for popular open-source components☆53Jul 27, 2022Updated 3 years ago
- Yara rules written by me, for free use.☆20Nov 26, 2021Updated 4 years ago
- CERT Australia Cyber Threat Intelligence (CTI) Toolkit☆15Nov 11, 2017Updated 8 years ago
- Collection of data sources that can be used to provide context to security events☆26Jun 30, 2015Updated 10 years ago
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆48Nov 11, 2022Updated 3 years ago
- Cybersecurity Ontology (CyberOnto) and Situational Awareness (CyberSA) help teamwork in Cyber Incident Responses, Control, Containment, a…☆10Sep 15, 2022Updated 3 years ago
- An LLM and OCR based Indicator of Compromise Extraction Tool☆38Dec 4, 2024Updated last year
- 🦉🔬A small PowerShell tool for finding information quickly on malicious IPs or FQDNs. Powershell threat hunting.☆11Jan 9, 2020Updated 6 years ago
- Bring Your Own Mitre Att&ck © Matrix !☆13Oct 19, 2023Updated 2 years ago
- Burp extension to find and decode BigIP and Netscaler cookies☆15Jul 20, 2018Updated 7 years ago
- Detect-X Automated Threat Detection by AI☆32Oct 10, 2019Updated 6 years ago
- Packer Templates☆18May 9, 2022Updated 3 years ago
- CARET - A tool for viewing cyber analytic relationships☆27Aug 21, 2020Updated 5 years ago
- Defensive S3 Bucket Squating☆31Jan 18, 2018Updated 8 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Dec 9, 2017Updated 8 years ago
- A simple, minimal C# windows service implementation that can be used to demonstrate privilege escalation from misconfigured windows servi…☆16Sep 4, 2015Updated 10 years ago
- Machine-readable .txt IP blocklist from ThreatFox by Abuse.ch, updated every hour.☆52Updated this week
- Source code for Hacker101.com - a free online web and mobile security class.☆16Apr 28, 2022Updated 3 years ago
- Support Windows OS Reversing by searching easily for references to functions across many DLLs☆36Jan 12, 2022Updated 4 years ago
- Scrape GrayHat Warefare for leaked code signing certificates. Outputs certificate hashes to crack with JtR☆12Nov 25, 2023Updated 2 years ago
- Modern x64 anti-debug library☆10Oct 29, 2019Updated 6 years ago
- Sigma detection rules for hunting with the threathunting-keywords project☆58Mar 2, 2025Updated last year
- ATT&CK Powered Suit is a browser extension that puts the complete MITRE ATT&CK® knowledge base at your fingertips with text search, conte…☆82Mar 9, 2026Updated last week
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.☆53Oct 23, 2024Updated last year
- An SSH honeypot written entirely in Go.☆12Dec 4, 2025Updated 3 months ago
- Get URLs from the Wayback Machine. Able to handle large outputs.☆35Sep 15, 2023Updated 2 years ago
- Repository of tools, YARA rules, and code-snippets from Stairwell's research team.☆23Jan 31, 2024Updated 2 years ago
- Discovery is a powerful PowerShell module that lets you probe the inner depths of the operating system.☆16Jul 26, 2014Updated 11 years ago
- Lunar Client Launch CLI for quick launching --help for arguments☆14Sep 26, 2023Updated 2 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Jan 8, 2024Updated 2 years ago
- ☆12Feb 23, 2015Updated 11 years ago
- My Python Cookiecutter project template☆32Sep 6, 2022Updated 3 years ago
- SyntheticSun is a defense-in-depth security automation and monitoring framework which utilizes threat intelligence, machine learning, man…☆82Jul 8, 2021Updated 4 years ago
- Cobalt Strike DNS beacon parser☆11Nov 29, 2021Updated 4 years ago
- Detects and punishes xrayers in mining situations.☆11Oct 10, 2023Updated 2 years ago
- Help deobfuscate VBScript☆18Jul 1, 2022Updated 3 years ago
- Interactive Threat Intelligence Bot that leverages serverless framework, AWS/GCP, and Slack☆27Nov 3, 2019Updated 6 years ago