Repository created to share information about tactics, techniques and procedures used by threat actors. Initially with ransomware groups and evolving to other types of threats.
☆407Jan 29, 2026Updated 3 months ago
Alternatives and similar repositories for ThreatActors-TTPs
Users that are interested in ThreatActors-TTPs are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- IOCs collected during day-to-day activities☆129Updated this week
- An Archive of Ransomware Notes Past and Present Collected by Zscaler ThreatLabz☆416May 5, 2026Updated 2 weeks ago
- A resource containing all the tools each ransomware gangs uses☆1,367May 11, 2026Updated last week
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆119Oct 29, 2024Updated last year
- A collection of CVEs weaponized by ransomware operators☆138May 9, 2026Updated last week
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Yet another Ransomware gang tracker☆605May 11, 2026Updated last week
- Telegram Monitor☆373Jun 10, 2025Updated 11 months ago
- Repository created to share information about tactics, techniques and procedures used by threat actors. Initially with ransomware groups …☆47Updated this week
- A collection of phishing samples for researchers and detection developers.☆421Mar 27, 2026Updated last month
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆6,870Updated this week
- Extract C2 Traffic☆255Nov 25, 2024Updated last year
- Automatically created C2 Feeds☆714Updated this week
- Awesome list of keywords and artifacts for Threat Hunting sessions☆655Aug 4, 2025Updated 9 months ago
- TL;DR: Mutate a binary to identify potential exploit candidates☆11Jan 12, 2026Updated 4 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- the transparent ransomware claim tracker 🥷🏼🧅🖥️☆1,105Mar 3, 2026Updated 2 months ago
- Encoder PHP webshell to bypass WAF using XOR operations.☆55Aug 2, 2023Updated 2 years ago
- Live Feed of C2 servers, tools, and botnets☆773Apr 13, 2026Updated last month
- OpenCTI.BR ThreatFeeds Public Repository☆123Updated this week
- MasterParser is a powerful DFIR tool designed for analyzing and parsing Linux logs☆758Feb 1, 2026Updated 3 months ago
- Interesting APT Report Collection And Some Special IOCs☆2,986May 9, 2026Updated last week
- eml metadata parser.☆17Jan 24, 2023Updated 3 years ago
- ☆12Mar 28, 2026Updated last month
- A curated list of Awesome Threat Intelligence Blogs☆542Apr 27, 2026Updated 3 weeks ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Indicators of compromise☆18May 13, 2026Updated last week
- CLI interface to get Ransomware attacks data from ransomwhat.telemetry.ltd☆13Feb 8, 2023Updated 3 years ago
- A repo containing some tooling build to assist with reverse engineering malware samples☆15Jul 22, 2023Updated 2 years ago
- Capture screenshots of onion services on an onion service.☆72Jun 11, 2024Updated last year
- Awesome Security lists for SOC/CERT/CTI☆1,449Updated this week
- Repository for sharing examples of our artifacts data and for use in new analyst recruitment.☆110Apr 22, 2025Updated last year
- Experience the power of a PHP webshell designed to overcome the limitations of blacklisted system/exec functions.☆25Jul 14, 2024Updated last year
- A command-line utility designed to recursively spider webpages for URLs. It works by actively traversing websites - following links embed…☆108Dec 8, 2025Updated 5 months ago
- Documentation and scripts to properly enable Windows event logs.☆704Oct 3, 2025Updated 7 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- EDRaser is a powerful tool for remotely deleting access logs, Windows event logs, databases, and other files on remote machines. It offer…☆375Apr 6, 2024Updated 2 years ago
- ☆16May 3, 2024Updated 2 years ago
- Raw data from Threat Intelligence Reports with automatic reports collection and keyword search across thousands of reports☆164May 7, 2026Updated last week
- A collection of papers, blogs, and resources that make up the quintessential aspects of cyber threat intelligence☆721Apr 25, 2026Updated 3 weeks ago
- A meta-list of public references to threat actor profiles and APT group datasets.☆80Oct 2, 2025Updated 7 months ago
- Malwoverview is a first response tool for threat hunting across VirusTotal, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, M…☆3,822Apr 16, 2026Updated last month
- Explore CVE 2023-30845 automatically across multiple subdomains☆16Sep 30, 2023Updated 2 years ago