☆54Aug 19, 2025Updated 8 months ago
Alternatives and similar repositories for ThreatMon-Reports-IOC
Users that are interested in ThreatMon-Reports-IOC are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆69Dec 27, 2023Updated 2 years ago
- Public access for readers of our technical blogs posts and reports can access IoCs and other data☆75Apr 9, 2024Updated 2 years ago
- Hollowise is a tool that implements process hollowing and PPID (Parent Process ID) spoofing techniques for masking a legitimate analysis …☆38Feb 20, 2025Updated last year
- ☆11Jun 12, 2023Updated 2 years ago
- ☆34Apr 8, 2026Updated last week
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Hive v5 file decryption algorithm☆34Nov 28, 2022Updated 3 years ago
- Smart and efficient tool to automate open redirect detection at scale.☆10Mar 21, 2022Updated 4 years ago
- Maintained by the ANY.RUN team, this repository provides YARA rules to help detect and classify various malware families and other malici…☆27Nov 1, 2025Updated 5 months ago
- Welcome to the SEKOIA.IO Community repository!☆184Updated this week
- Threat feeds designed to extract adversarial TTPs and IOCs, using: ✨AI✨☆69Apr 5, 2026Updated 2 weeks ago
- ☆12Jan 5, 2021Updated 5 years ago
- ☆81Sep 29, 2025Updated 6 months ago
- Indicators of Compromise☆269Updated this week
- Sigma detection rules for hunting with the threathunting-keywords project☆59Mar 2, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Advanced Threat Hunting: Ransomware Group☆28Jul 9, 2025Updated 9 months ago
- Crawler that retrieves commoncrawl's crawled hosts and their corresponding IPs☆21Sep 1, 2025Updated 7 months ago
- Create Suricata and Snort DNS signatures given a single domain or list of domains in a file.☆18Nov 13, 2017Updated 8 years ago
- the transparent ransomware claim tracker 🥷🏼🧅🖥️☆1,099Mar 3, 2026Updated last month
- A tool to generate datasets and models based on vulnerabilities descriptions from @Vulnerability-Lookup.☆25Updated this week
- QRadar AQL backend for converting Sigma rules to QRadar AQL queries☆14Sep 18, 2025Updated 7 months ago
- Repository of Yara rules created by the Stratosphere team☆29Jul 8, 2021Updated 4 years ago
- Forensic tool for extracting and analyzing Google DriveFS cached files and metadata.☆20May 9, 2025Updated 11 months ago
- Citrix Scanner for CVE-2023-3519☆53Jul 24, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A collection of curated YARA rules used as part of the Filescan.io service☆22Updated this week
- Assignments for the cryptography engineering course☆12Dec 17, 2013Updated 12 years ago
- Permissionless pooling of NFT's into an ERC20.☆14Dec 22, 2022Updated 3 years ago
- Repositorio con recursos de valor para los participantes de la 3ra edición del Programa de Fundamentos de Ciberseguridad (2022).☆13Apr 16, 2022Updated 4 years ago
- Menu for Thor scanner lite☆20Oct 24, 2025Updated 5 months ago
- ☆22Jan 11, 2026Updated 3 months ago
- God Mode Detection Rules☆132Aug 8, 2024Updated last year
- Manage attack surface data on Elasticsearch☆25Nov 20, 2023Updated 2 years ago
- YARA, SIGMA, SNORT Rules based on Malware Analysis☆17Apr 23, 2025Updated 11 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- TweetFeed collects Indicators of Compromise (IOCs) shared by the infosec community at Twitter. Here you will find malicious URLs, domains…☆650Updated this week
- Technical Tabletop Exercises Simulation Framework☆47Oct 30, 2023Updated 2 years ago
- ADSI based SA tool☆17Apr 9, 2022Updated 4 years ago
- Building a consolidated RSS feed for articles about cyberattacks☆74Updated this week
- Conceptual Methods for Finding Commonalities in Macho Files☆12Mar 21, 2024Updated 2 years ago
- Hunt for C2 servers and phishing web sites using VirusTotal API , you can modify code to kill the malicious process☆75May 19, 2024Updated last year
- Corporative registry worldwide catalog. 63 countries☆16Jun 24, 2022Updated 3 years ago