Open IOC sharing platform
☆63Jan 1, 2026Updated 2 months ago
Alternatives and similar repositories for ThreatFox
Users that are interested in ThreatFox are comparing it to the libraries listed below
Sorting:
- Open YARA scan- and search engine☆26Feb 23, 2025Updated last year
- Open platform for sharing malware distribution sites☆63Nov 9, 2024Updated last year
- ☆11Dec 9, 2025Updated 2 months ago
- ☆13Oct 10, 2022Updated 3 years ago
- Mass Assigner is a simple tool made to probe for mass assignment vulnerability through JSON field modification in HTTP requests☆17Jun 22, 2024Updated last year
- This is my malware database, but I AM NOT RESPONSIABLE FOR ANY DAMAGE + pan koza is a skid and ready to fork this $h!t.☆12May 26, 2024Updated last year
- Open platform for sharing confirmed Malware samples☆39Nov 9, 2024Updated last year
- Phosphor operating system☆20Jul 12, 2024Updated last year
- Python Script to quickly check if a host is running NetScaler Gateway and/or AAA☆12Jul 27, 2023Updated 2 years ago
- Kaseya REvil CNC domains☆12Jan 30, 2024Updated 2 years ago
- Script fingerprinting systems based on shodan.io data☆13Jul 9, 2018Updated 7 years ago
- Similar to Petitpotam, the netdfs service is enabled in Windows Server and AD environments, and the abused RPC method allows privileged p…☆49Jun 21, 2022Updated 3 years ago
- Conference talk slides and code☆11Aug 6, 2020Updated 5 years ago
- 🐻❄️ 🏹 Threat hunting with Polars and flaws.cloud AWS CloudTrail datasets.☆14May 22, 2024Updated last year
- Information Stealers Wall of Sheep (IS-WOS)☆11Nov 13, 2020Updated 5 years ago
- AIL project training materials☆39Feb 24, 2026Updated last week
- Generate list of potential typo squatting domains with domain name permutation engine to feed AIL and other systems.☆102Apr 30, 2025Updated 10 months ago
- Sources Codes of many Office Malwares☆17Sep 4, 2022Updated 3 years ago
- ☆14Jun 7, 2023Updated 2 years ago
- A set of tool for the decoding and conversion of AdBlock and Filter Lists.☆16Mar 22, 2022Updated 3 years ago
- ☆66Sep 1, 2023Updated 2 years ago
- Sorta reverse implementation of ShoVAT - Also includes NMAP banner regex results☆16Dec 28, 2018Updated 7 years ago
- Chapter 9: Disseminate☆16Sep 6, 2017Updated 8 years ago
- ☆17Aug 18, 2022Updated 3 years ago
- An unsorted collection of little tools and scripts I've made that don't fit anywhere else☆19Jul 15, 2022Updated 3 years ago
- Detection Rule License (DRL)☆21Dec 27, 2024Updated last year
- Melee: Tool to Detect Infections in MySQL Instances☆22Aug 6, 2023Updated 2 years ago
- IOC/Hash scanner and IDS layer 4 designed to be portable and fast☆27Jan 28, 2026Updated last month
- blocklist☆18Oct 20, 2025Updated 4 months ago
- Download all malicious files from a Kippo SSH honeypot database☆23Mar 24, 2014Updated 11 years ago
- Zerologon Check and Exploit - Discovered by Tom Tervoort of Secura and expanded on @Dirkjanm's cve-2020-1472 coded example. This tool wil…☆18Apr 12, 2022Updated 3 years ago
- ☆19Apr 28, 2022Updated 3 years ago
- Deepsearch leak database client, as an alternative for pwndb☆15Dec 6, 2022Updated 3 years ago
- Assemblyline 4 Malware detonation service (Cuckoo)☆17Feb 12, 2024Updated 2 years ago
- CocktailParty is a data broker system based on phoenix framework☆23Apr 23, 2025Updated 10 months ago
- TIE is a machine learning model for inferring associated MITRE ATT&CK techniques from previously observed techniques.☆67Apr 19, 2025Updated 10 months ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆83Apr 27, 2024Updated last year
- Totem maltego transform☆29Sep 23, 2020Updated 5 years ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆55Dec 5, 2024Updated last year