Repository created to share information about tactics, techniques and procedures used by threat actors. Initially with ransomware groups and evolving to other types of threats.
☆397Jan 29, 2026Updated last month
Alternatives and similar repositories for ThreatActors-TTPs
Users that are interested in ThreatActors-TTPs are comparing it to the libraries listed below
Sorting:
- An Archive of Ransomware Notes Past and Present Collected by Zscaler ThreatLabz☆404Feb 25, 2026Updated last week
- A resource containing all the tools each ransomware gangs uses☆1,332Dec 24, 2025Updated 2 months ago
- IOCs collected during day-to-day activities☆111Updated this week
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆117Oct 29, 2024Updated last year
- Awesome list of keywords and artifacts for Threat Hunting sessions☆641Aug 4, 2025Updated 7 months ago
- A collection of CVEs weaponized by ransomware operators☆129Oct 13, 2025Updated 4 months ago
- A collection of phishing samples for researchers and detection developers.☆401Feb 6, 2026Updated last month
- TL;DR: Mutate a binary to identify potential exploit candidates☆11Jan 12, 2026Updated last month
- Extract C2 Traffic☆253Nov 25, 2024Updated last year
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆6,636Updated this week
- Yet another Ransomware gang tracker☆563Feb 24, 2026Updated last week
- A C2 framework for all your God Complex. A fully functional and integrated Botnet for remote command execution through user friendly UI.☆45Sep 22, 2023Updated 2 years ago
- Live Feed of C2 servers, tools, and botnets☆751Mar 2, 2026Updated last week
- Telegram Monitor☆370Jun 10, 2025Updated 8 months ago
- Automatically created C2 Feeds☆667Updated this week
- MasterParser is a powerful DFIR tool designed for analyzing and parsing Linux logs☆757Feb 1, 2026Updated last month
- Explore CVE 2023-30845 automatically across multiple subdomains☆16Sep 30, 2023Updated 2 years ago
- the transparent ransomware claim tracker 🥷🏼🧅🖥️☆1,091Updated this week
- Experience the power of a PHP webshell designed to overcome the limitations of blacklisted system/exec functions.☆26Jul 14, 2024Updated last year
- Repository for threat hunting and detection queries, etc. for Defender for Endpoint and Microsoft Sentinel in KQL(Kusto Query Language).☆803Jan 14, 2026Updated last month
- EDRaser is a powerful tool for remotely deleting access logs, Windows event logs, databases, and other files on remote machines. It offer…☆374Apr 6, 2024Updated last year
- A repo containing some tooling build to assist with reverse engineering malware samples☆15Jul 22, 2023Updated 2 years ago
- A collection of papers, blogs, and resources that make up the quintessential aspects of cyber threat intelligence☆706Apr 21, 2025Updated 10 months ago
- Documentation and scripts to properly enable Windows event logs.☆673Oct 3, 2025Updated 5 months ago
- ☆12Feb 9, 2025Updated last year
- Encoder PHP webshell to bypass WAF using XOR operations.☆55Aug 2, 2023Updated 2 years ago
- Interesting APT Report Collection And Some Special IOCs☆2,929Updated this week
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆45Mar 8, 2024Updated 2 years ago
- CLI tools for forensic investigation of Windows artifacts☆349Jul 21, 2025Updated 7 months ago
- Capture screenshots of onion services on an onion service.☆73Jun 11, 2024Updated last year
- Map tracking ransomware, by OCD World Watch team☆485Feb 20, 2026Updated 2 weeks ago
- Awesome Security lists for SOC/CERT/CTI☆1,271Updated this week
- Repository created to share information about tactics, techniques and procedures used by threat actors. Initially with ransomware groups …☆43Mar 3, 2026Updated last week
- An automated script to extract hidden images from Tecno Camon X☆12Sep 23, 2023Updated 2 years ago
- Shodan Dorks 2023☆245Jan 13, 2025Updated last year
- Repository for sharing examples of our artifacts data and for use in new analyst recruitment.☆109Apr 22, 2025Updated 10 months ago
- A curated list of Awesome Threat Intelligence Blogs☆508Feb 16, 2026Updated 3 weeks ago
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆146May 31, 2024Updated last year
- PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection…☆726Feb 14, 2026Updated 3 weeks ago