TIH is an intelligence tool that helps you in searching for IOCs across multiple openly available security feeds and some well known APIs. The idea behind the tool is to facilitate searching and storing of frequently added IOCs for creating your own local database of indicators.
☆157Jun 13, 2025Updated 10 months ago
Alternatives and similar repositories for Threat-Intelligence-Hunter
Users that are interested in Threat-Intelligence-Hunter are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A collection of Yara rules I have created so far☆16Oct 26, 2020Updated 5 years ago
- Collection of my test rules and Submissions to Emerging-Sigs☆11Apr 22, 2016Updated 10 years ago
- Threat Intelligence APIs☆283Apr 2, 2026Updated last month
- Tool to extract indicators of compromise from security reports in PDF format☆439Feb 24, 2023Updated 3 years ago
- Threat-Intelligence Feeds & Tools & Frameworks☆222Jun 7, 2024Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Visualize your CRITs IOC's in Maltego☆12Jan 13, 2015Updated 11 years ago
- The GOSINT framework is a project used for collecting, processing, and exporting high quality indicators of compromise (IOCs).☆557May 9, 2023Updated 3 years ago
- Threatelligence is a simple cyber threat intelligence feed collector, using Elasticsearch, Kibana and Python to automatically collect int…☆151Jun 3, 2014Updated 11 years ago
- QRadio ~ Best Threat Intelligence Radio ~ Tune In!☆99May 20, 2016Updated 9 years ago
- Tool to gather Threat Intelligence indicators from publicly available sources☆658Mar 14, 2019Updated 7 years ago
- IOC Management and Visualization Tool☆48Dec 8, 2022Updated 3 years ago
- Custom rules for yara-integrated scans☆16Jun 5, 2013Updated 12 years ago
- Cli interface to threatcrowd.org☆21Jul 6, 2017Updated 8 years ago
- ThreatTracker is a Python script designed to monitor and generate alerts on given sets of indicators of compromise (IOCs) indexed by a se…☆71Mar 9, 2015Updated 11 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Cyber Threat Intelligence Feeds☆97Sep 26, 2016Updated 9 years ago
- Harbinger Threat Intelligence☆83Dec 8, 2015Updated 10 years ago
- Threat Intelligence distribution☆31Dec 30, 2015Updated 10 years ago
- Hunting IOCs all day every day...☆89Sep 26, 2023Updated 2 years ago
- A set of templates for documenting threat intelligence☆75Feb 28, 2013Updated 13 years ago
- Malware/IOC ingestion and processing engine☆110Nov 20, 2018Updated 7 years ago
- Machinae Security Intelligence Collector☆540May 15, 2024Updated last year
- A set of Maltego transforms for VirusTotal Public API v2.0. This set has the added functionality of caching queries on a daily basis to s…☆82Nov 29, 2015Updated 10 years ago
- Open Source Threat Intelligence Chat Bot☆321Mar 30, 2020Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A modular Python application to pull intelligence about malicious files☆123Dec 4, 2020Updated 5 years ago
- A Maltego transform and machine to identify possible phishing vectors using permutated domains☆15Oct 14, 2015Updated 10 years ago
- Automater - IP URL and MD5 OSINT Analysis☆556Aug 13, 2024Updated last year
- CIF v3 -- the fastest way to consume threat intelligence☆184Apr 20, 2023Updated 3 years ago
- Some IR notes☆73Jul 23, 2016Updated 9 years ago
- Multithreaded threat Intelligence gathering built with Python3☆177Jan 23, 2018Updated 8 years ago
- Your Everyday Threat Intelligence☆1,977Apr 14, 2026Updated 3 weeks ago
- DEPRECATED - USE v3 (bearded-avenger)☆229Jan 16, 2018Updated 8 years ago
- An informational repo about hunting for adversaries in your IT environment.☆1,864Nov 17, 2021Updated 4 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Based on the Volatility framework, this script will run various plugins as well as create a timeline, or use YARA/ClamAV/VirusTotal to fi…☆49May 31, 2017Updated 8 years ago
- Cyber Threat Intelligence - Toolbox☆52Oct 8, 2018Updated 7 years ago
- ☆305May 28, 2017Updated 8 years ago
- ARCHIVED ce1sus, a threat information database ARCHIVED☆28Dec 8, 2015Updated 10 years ago
- FAME Automates Malware Evaluation☆937Updated this week
- A modular Python application to collect intelligence for malicious hosts.☆275Apr 13, 2021Updated 5 years ago
- DPS' Lightweight Investigation Notebook☆434Dec 31, 2023Updated 2 years ago