Repository created to share information about tactics, techniques and procedures used by threat actors. Initially with ransomware groups and evolving to other types of threats.
☆403Jan 29, 2026Updated 3 months ago
Alternatives and similar repositories for ThreatActors-TTPs
Users that are interested in ThreatActors-TTPs are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- IOCs collected during day-to-day activities☆129Apr 17, 2026Updated last week
- An Archive of Ransomware Notes Past and Present Collected by Zscaler ThreatLabz☆415Apr 6, 2026Updated 3 weeks ago
- A resource containing all the tools each ransomware gangs uses☆1,355Apr 1, 2026Updated 3 weeks ago
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆118Oct 29, 2024Updated last year
- A collection of CVEs weaponized by ransomware operators☆129Oct 13, 2025Updated 6 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Yet another Ransomware gang tracker☆580Updated this week
- Telegram Monitor☆373Jun 10, 2025Updated 10 months ago
- Repository created to share information about tactics, techniques and procedures used by threat actors. Initially with ransomware groups …☆46Updated this week
- A collection of phishing samples for researchers and detection developers.☆417Mar 27, 2026Updated last month
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆6,810Updated this week
- Extract C2 Traffic☆254Nov 25, 2024Updated last year
- Automatically created C2 Feeds☆674Apr 23, 2026Updated last week
- Awesome list of keywords and artifacts for Threat Hunting sessions☆654Aug 4, 2025Updated 8 months ago
- TL;DR: Mutate a binary to identify potential exploit candidates☆11Jan 12, 2026Updated 3 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- the transparent ransomware claim tracker 🥷🏼🧅🖥️☆1,103Mar 3, 2026Updated last month
- Encoder PHP webshell to bypass WAF using XOR operations.☆55Aug 2, 2023Updated 2 years ago
- Live Feed of C2 servers, tools, and botnets☆771Apr 13, 2026Updated 2 weeks ago
- OpenCTI.BR ThreatFeeds Public Repository☆123Updated this week
- MasterParser is a powerful DFIR tool designed for analyzing and parsing Linux logs☆758Feb 1, 2026Updated 2 months ago
- Interesting APT Report Collection And Some Special IOCs☆2,974Updated this week
- eml metadata parser.☆17Jan 24, 2023Updated 3 years ago
- ☆12Mar 28, 2026Updated last month
- A curated list of Awesome Threat Intelligence Blogs☆531Apr 19, 2026Updated last week
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Indicators of compromise☆17Jan 29, 2026Updated 3 months ago
- CLI interface to get Ransomware attacks data from ransomwhat.telemetry.ltd☆13Feb 8, 2023Updated 3 years ago
- A repo containing some tooling build to assist with reverse engineering malware samples☆15Jul 22, 2023Updated 2 years ago
- Capture screenshots of onion services on an onion service.☆72Jun 11, 2024Updated last year
- Awesome Security lists for SOC/CERT/CTI☆1,430Updated this week
- Repository for sharing examples of our artifacts data and for use in new analyst recruitment.☆110Apr 22, 2025Updated last year
- Experience the power of a PHP webshell designed to overcome the limitations of blacklisted system/exec functions.☆25Jul 14, 2024Updated last year
- A command-line utility designed to recursively spider webpages for URLs. It works by actively traversing websites - following links embed…☆107Dec 8, 2025Updated 4 months ago
- Documentation and scripts to properly enable Windows event logs.☆694Oct 3, 2025Updated 6 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- EDRaser is a powerful tool for remotely deleting access logs, Windows event logs, databases, and other files on remote machines. It offer…☆375Apr 6, 2024Updated 2 years ago
- ☆16May 3, 2024Updated last year
- Raw data from Threat Intelligence Reports with automatic reports collection and keyword search across thousands of reports☆163Updated this week
- A meta-list of public references to threat actor profiles and APT group datasets.☆80Oct 2, 2025Updated 6 months ago
- A collection of papers, blogs, and resources that make up the quintessential aspects of cyber threat intelligence☆720Updated this week
- Malwoverview is a first response tool for threat hunting across VirusTotal, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, M…☆3,760Apr 16, 2026Updated last week
- Explore CVE 2023-30845 automatically across multiple subdomains☆16Sep 30, 2023Updated 2 years ago