☆52Aug 19, 2025Updated 6 months ago
Alternatives and similar repositories for ThreatMon-Reports-IOC
Users that are interested in ThreatMon-Reports-IOC are comparing it to the libraries listed below
Sorting:
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆69Dec 27, 2023Updated 2 years ago
- A complete system to deploy functional Honeypots to all infrastructures that needs to be notified when something anomalous occur☆10Feb 8, 2022Updated 4 years ago
- Smart and efficient tool to automate open redirect detection at scale.☆10Mar 21, 2022Updated 3 years ago
- ☆12Jan 5, 2021Updated 5 years ago
- Generate HTTPS reports based on scan data☆15Feb 18, 2026Updated 2 weeks ago
- Public access for readers of our technical blogs posts and reports can access IoCs and other data☆75Apr 9, 2024Updated last year
- ☆11Jun 12, 2023Updated 2 years ago
- Rules Shared by the Community from 100 Days of YARA 2023☆78Apr 12, 2023Updated 2 years ago
- A tool to generate datasets and models based on vulnerabilities descriptions from @Vulnerability-Lookup.☆23Updated this week
- ☆34Nov 11, 2025Updated 3 months ago
- Corporative registry worldwide catalog. 63 countries☆16Jun 24, 2022Updated 3 years ago
- shared samples from #dailyphish and/or #apt tweets☆41Sep 3, 2025Updated 6 months ago
- Crawler that retrieves commoncrawl's crawled hosts and their corresponding IPs☆21Sep 1, 2025Updated 6 months ago
- Conceptual Methods for Finding Commonalities in Macho Files☆12Mar 21, 2024Updated last year
- visually see issues with supported cipher suites☆17Jun 18, 2024Updated last year
- Minimal version for https://github.com/zmap/zgrab.☆16Sep 17, 2022Updated 3 years ago
- Welcome to the SEKOIA.IO Community repository!☆178Feb 6, 2026Updated last month
- Indicators of Compromise☆261Updated this week
- ADSI based SA tool☆17Apr 9, 2022Updated 3 years ago
- Router Vulnerabilities Scanner☆14Jun 1, 2020Updated 5 years ago
- A collection of curated YARA rules used as part of the Filescan.io service☆22Feb 18, 2026Updated 2 weeks ago
- Repository of Yara Rules☆141Feb 16, 2026Updated 3 weeks ago
- Maintained by the ANY.RUN team, this repository provides YARA rules to help detect and classify various malware families and other malici…☆26Nov 1, 2025Updated 4 months ago
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆24Jun 13, 2023Updated 2 years ago
- Exactly what it sounds like, which is something rad☆22Oct 12, 2022Updated 3 years ago
- Source code used at TweetFeed.live☆48Nov 21, 2022Updated 3 years ago
- God Mode Detection Rules☆132Aug 8, 2024Updated last year
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆103Dec 13, 2023Updated 2 years ago
- Citrix Scanner for CVE-2023-3519☆53Jul 24, 2023Updated 2 years ago
- Sigma detection rules for hunting with the threathunting-keywords project☆58Mar 2, 2025Updated last year
- Manage attack surface data on Elasticsearch☆24Nov 20, 2023Updated 2 years ago
- Some useful test data or payloads☆24Oct 30, 2021Updated 4 years ago
- The open ransomware payment tracker☆102Aug 29, 2025Updated 6 months ago
- the transparent ransomware claim tracker 🥷🏼🧅🖥️☆1,091Mar 3, 2026Updated last week
- Generate portable TTP intelligence from a web-based report☆31Oct 24, 2022Updated 3 years ago
- Advanced Threat Hunting: Ransomware Group☆29Jul 9, 2025Updated 8 months ago
- Repository of Yara rules created by the Stratosphere team☆29Jul 8, 2021Updated 4 years ago
- ☆32Mar 26, 2024Updated last year
- Hunting Malicious Macros SANS Threathunting Summit 2021 Materials☆39Oct 9, 2021Updated 4 years ago