ThreatMon / ThreatMon-Reports-IOCView external linksLinks
☆52Aug 19, 2025Updated 5 months ago
Alternatives and similar repositories for ThreatMon-Reports-IOC
Users that are interested in ThreatMon-Reports-IOC are comparing it to the libraries listed below
Sorting:
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆69Dec 27, 2023Updated 2 years ago
- A complete system to deploy functional Honeypots to all infrastructures that needs to be notified when something anomalous occur☆10Feb 8, 2022Updated 4 years ago
- Generate HTTPS reports based on scan data☆15Updated this week
- Smart and efficient tool to automate open redirect detection at scale.☆10Mar 21, 2022Updated 3 years ago
- ☆11Jan 5, 2021Updated 5 years ago
- Public access for readers of our technical blogs posts and reports can access IoCs and other data☆75Apr 9, 2024Updated last year
- ☆11Jun 12, 2023Updated 2 years ago
- Rules Shared by the Community from 100 Days of YARA 2023☆78Apr 12, 2023Updated 2 years ago
- ☆78Sep 29, 2025Updated 4 months ago
- A tool to generate datasets and models based on vulnerabilities descriptions from @Vulnerability-Lookup.☆23Updated this week
- A collaborative, multi-platform, red teaming framework☆13Jan 19, 2020Updated 6 years ago
- Corporative registry worldwide catalog. 63 countries☆16Jun 24, 2022Updated 3 years ago
- visually see issues with supported cipher suites☆17Jun 18, 2024Updated last year
- Minimal version for https://github.com/zmap/zgrab.☆16Sep 17, 2022Updated 3 years ago
- Conceptual Methods for Finding Commonalities in Macho Files☆12Mar 21, 2024Updated last year
- Crawler that retrieves commoncrawl's crawled hosts and their corresponding IPs☆21Sep 1, 2025Updated 5 months ago
- Welcome to the SEKOIA.IO Community repository!☆178Feb 6, 2026Updated last week
- Indicators of Compromise☆257Feb 9, 2026Updated last week
- ADSI based SA tool☆17Apr 9, 2022Updated 3 years ago
- Standard-Format Threat Intelligence Feeds☆127Updated this week
- Router Vulnerabilities Scanner☆14Jun 1, 2020Updated 5 years ago
- A collection of curated YARA rules used as part of the Filescan.io service☆22Feb 10, 2026Updated last week
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆24Jun 13, 2023Updated 2 years ago
- Exactly what it sounds like, which is something rad☆22Oct 12, 2022Updated 3 years ago
- ☆19Feb 27, 2025Updated 11 months ago
- Abandonned, Bibliogram has been discontinued for a while and no one forked it https://cadence.moe/blog/2022-09-01-discontinuing-bibliogra…☆18Jun 2, 2022Updated 3 years ago
- Source code used at TweetFeed.live☆48Nov 21, 2022Updated 3 years ago
- God Mode Detection Rules☆134Aug 8, 2024Updated last year
- Manage attack surface data on Elasticsearch☆24Nov 20, 2023Updated 2 years ago
- A CALDERA plugin☆26Oct 6, 2025Updated 4 months ago
- Citrix Scanner for CVE-2023-3519☆53Jul 24, 2023Updated 2 years ago
- TOP 40 - 1.4 Billion Clear Text Credentials☆28Dec 12, 2017Updated 8 years ago
- Some useful test data or payloads☆24Oct 30, 2021Updated 4 years ago
- The open ransomware payment tracker☆102Aug 29, 2025Updated 5 months ago
- the transparent ransomware claim tracker 🥷🏼🧅🖥️☆1,088Jun 17, 2025Updated 8 months ago
- Generate portable TTP intelligence from a web-based report☆31Oct 24, 2022Updated 3 years ago
- Advanced Threat Hunting: Ransomware Group☆29Jul 9, 2025Updated 7 months ago
- Repositorio con recursos de valor para los participantes de la 3ra edición del Programa de Fundamentos de Ciberseguridad (2022).☆13Apr 16, 2022Updated 3 years ago
- Repository of Yara rules created by the Stratosphere team☆29Jul 8, 2021Updated 4 years ago