IOCs collected during day-to-day activities
☆114Mar 16, 2026Updated this week
Alternatives and similar repositories for Daily-Hunt
Users that are interested in Daily-Hunt are comparing it to the libraries listed below
Sorting:
- ☆55Mar 5, 2026Updated 2 weeks ago
- CLI generator for Velociraptor offline collector☆16Mar 6, 2026Updated 2 weeks ago
- ☆20Jan 14, 2026Updated 2 months ago
- Repository created to share information about tactics, techniques and procedures used by threat actors. Initially with ransomware groups …☆396Jan 29, 2026Updated last month
- Have you ever wanted to search a link or IP address on multiple OSINT pages at once?☆59Jul 7, 2025Updated 8 months ago
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Jun 5, 2023Updated 2 years ago
- ☆384Updated this week
- A project designed to make the operationalization of open-source cyber threat intelligence more efficient.☆17Updated this week
- Threat Hunting Malware Infrastructure☆11Dec 3, 2023Updated 2 years ago
- This Repository consists all Public Cheatsheets created by BlackPerl DFIR Content Team☆20Oct 9, 2024Updated last year
- David is a very funny man☆10Feb 19, 2021Updated 5 years ago
- Spring4Shell (CVE-2022-22965)☆12Apr 7, 2022Updated 3 years ago
- A curated list of Awesome Threat Intelligence Blogs☆512Feb 16, 2026Updated last month
- An Archive of Ransomware Notes Past and Present Collected by Zscaler ThreatLabz☆406Updated this week
- Thor Artifacts for Velociraptor☆19Dec 2, 2025Updated 3 months ago
- make virus without coding☆12Apr 7, 2020Updated 5 years ago
- Docker container for running CobaltStrike 4.10☆38Sep 18, 2024Updated last year
- This repository contains indicators of compromise (IOCs) of our various investigations.☆314Nov 4, 2025Updated 4 months ago
- Yet another Ransomware gang tracker☆565Mar 12, 2026Updated last week
- MISP Playbooks☆222Oct 14, 2025Updated 5 months ago
- A collection of CVEs weaponized by ransomware operators☆129Oct 13, 2025Updated 5 months ago
- A repository to store community malware research notes and findings.☆15Feb 13, 2026Updated last month
- ☆13Nov 10, 2020Updated 5 years ago
- Eset-Unload is a C++ tool that interacts with a process's loaded modules to identify and unload the ebehmoni.dll module, typically found …☆12Apr 21, 2025Updated 10 months ago
- Multilayered secret detection tool☆41Feb 11, 2026Updated last month
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆45Feb 13, 2026Updated last month
- A tool matrix for Russian APTs based on the Ransomware Tool Matrix☆232Aug 20, 2025Updated 7 months ago
- CarbonBlack EDR detection rules and response actions☆73Sep 10, 2024Updated last year
- A ProcessMonitor visualization application written in rust.☆184Aug 6, 2023Updated 2 years ago
- ☆14Sep 28, 2023Updated 2 years ago
- CLI-based 802.11 Rogue (Fake) AP & Hidden AP Spotter☆14Dec 26, 2025Updated 2 months ago
- Sometimes, threat feeds share critical information with certain details blurred, which is a good practice. However, CTI analysts still ne…☆12Sep 18, 2025Updated 6 months ago
- Collaborative malware exchange repository.☆34Nov 21, 2024Updated last year
- This repo contain Android malware samples and analysis☆13Apr 3, 2021Updated 4 years ago
- BitRat Source Code☆42Oct 23, 2020Updated 5 years ago
- A resource containing all the tools each ransomware gangs uses☆1,329Updated this week
- A compilation of snort rules for detecting malware traffic.☆16Feb 7, 2021Updated 5 years ago
- Heroes of newerth scripting pack☆18Jan 21, 2023Updated 3 years ago
- To be used with tools like GoBuster & DirBuster but these lists are specifically tailored and designed for scanning phishing <>< landing …☆78Mar 10, 2026Updated last week