IOCs collected during day-to-day activities
☆109Updated this week
Alternatives and similar repositories for Daily-Hunt
Users that are interested in Daily-Hunt are comparing it to the libraries listed below
Sorting:
- CLI generator for Velociraptor offline collector☆16Oct 10, 2025Updated 4 months ago
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Jun 5, 2023Updated 2 years ago
- ☆54Feb 2, 2026Updated 3 weeks ago
- Repository created to share information about tactics, techniques and procedures used by threat actors. Initially with ransomware groups …☆393Jan 29, 2026Updated last month
- Indicators of compromise☆17Jan 29, 2026Updated last month
- ☆20Jan 14, 2026Updated last month
- This Repository consists all Public Cheatsheets created by BlackPerl DFIR Content Team☆20Oct 9, 2024Updated last year
- Have you ever wanted to search a link or IP address on multiple OSINT pages at once?☆59Jul 7, 2025Updated 7 months ago
- Docker container for running CobaltStrike 4.10☆38Sep 18, 2024Updated last year
- A PowerShell-based malware designed to completely disable all Windows security features, featuring UAC bypass and advanced anti-virtualiz…☆67Feb 14, 2026Updated 2 weeks ago
- ☆12Jun 1, 2024Updated last year
- POC for CVE-2024-31982: XWiki Platform Remote Code Execution > 14.10.20☆10Jun 22, 2024Updated last year
- Bash-based recon automation script that orchestrates tools like Nmap, Dirsearch (Python), and crt.sh to perform port scanning, directory …☆15Jul 22, 2025Updated 7 months ago
- David is a very funny man☆10Feb 19, 2021Updated 5 years ago
- Raw data from Threat Intelligence Reports with automatic reports collection and keyword search across thousands of reports☆153Updated this week
- An Archive of Ransomware Notes Past and Present Collected by Zscaler ThreatLabz☆402Updated this week
- Hunt the windows Registry automatically using VQL☆13Jan 6, 2026Updated last month
- EvtXHunt is an Autopsy plugin that is able to analyze Windows EVTX logs against a library of SIGMA rules.☆15Nov 7, 2021Updated 4 years ago
- Exploit for CVE-2024-3273, supports single and multiple hosts☆13Apr 7, 2024Updated last year
- Multilayered secret detection tool☆41Feb 11, 2026Updated 2 weeks ago
- Ransonware simples, criptografa arquivos e volta ao normal com a chave fornecida☆10Jan 28, 2021Updated 5 years ago
- Spring4Shell (CVE-2022-22965)☆12Apr 7, 2022Updated 3 years ago
- A curated list of Awesome Threat Intelligence Blogs☆502Feb 16, 2026Updated last week
- ☆380Feb 20, 2026Updated last week
- Thor Artifacts for Velociraptor☆19Dec 2, 2025Updated 2 months ago
- This repo contain Android malware samples and analysis☆13Apr 3, 2021Updated 4 years ago
- Windows Event Log Killer☆11May 22, 2017Updated 8 years ago
- Eset-Unload is a C++ tool that interacts with a process's loaded modules to identify and unload the ebehmoni.dll module, typically found …☆12Apr 21, 2025Updated 10 months ago
- ☆15May 3, 2024Updated last year
- Utilities for the memory forensics framework☆22Jul 31, 2018Updated 7 years ago
- ☆13Nov 10, 2020Updated 5 years ago
- CLI-based 802.11 Rogue (Fake) AP & Hidden AP Spotter☆14Dec 26, 2025Updated 2 months ago
- A repository to store community malware research notes and findings.☆15Feb 13, 2026Updated 2 weeks ago
- Sometimes, threat feeds share critical information with certain details blurred, which is a good practice. However, CTI analysts still ne…☆12Sep 18, 2025Updated 5 months ago
- make virus without coding☆12Apr 7, 2020Updated 5 years ago
- Advanced test for proxy & waf☆13Feb 10, 2026Updated 2 weeks ago
- Scripts targeting specific families☆13Jul 3, 2017Updated 8 years ago
- KQL Sentinel and Defender Detection and Hunting Queries.☆15Updated this week
- A collection of CVEs weaponized by ransomware operators☆129Oct 13, 2025Updated 4 months ago