A collection of methods to learn who the owner of an IP address is.
☆224Sep 29, 2025Updated 5 months ago
Alternatives and similar repositories for Attribution-to-IP
Users that are interested in Attribution-to-IP are comparing it to the libraries listed below
Sorting:
- ☆11Dec 9, 2025Updated 3 months ago
- Finding ClickFix and FakeCAPTCHA like it's 1999☆121Mar 2, 2026Updated last week
- Invictus Threat Intelligence: IOCs and TTPs from blogs, research and more☆30Nov 26, 2025Updated 3 months ago
- A JXA script for enumerating running processes, printed out in a json, parent-child tree.☆14Jan 28, 2022Updated 4 years ago
- An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.☆202Jul 3, 2024Updated last year
- A community-driven repository for threat hunting ideas, methodologies, and research that serves as a central gathering place for hunters …☆303Updated this week
- Intel Retrieval Augmented Generation (RAG) Utilities☆91Jan 29, 2024Updated 2 years ago
- Cyber Underground General Intelligence Requirements☆98Feb 2, 2024Updated 2 years ago
- AIL project training materials☆39Feb 24, 2026Updated last week
- The Threat Actor Profile Guide for CTI Analysts☆116Jul 15, 2023Updated 2 years ago
- Suzaku (朱雀) is a sigma-based threat hunting and fast forensics timeline generator for cloud logs.☆168Dec 7, 2025Updated 3 months ago
- ☆78Feb 4, 2026Updated last month
- ☆105Dec 9, 2025Updated 2 months ago
- Malware Analysis tools☆26Sep 14, 2024Updated last year
- A resource containing all the tools each ransomware gangs uses☆1,332Dec 24, 2025Updated 2 months ago
- self-hosted Azure OSINT tool☆33Jun 24, 2025Updated 8 months ago
- Repository where I hold random detection and threat hunting queries that I come up with based on different sources of information (or eve…☆277Dec 20, 2025Updated 2 months ago
- A collection of CVEs weaponized by ransomware operators☆129Oct 13, 2025Updated 4 months ago
- PowerShell tools to help defenders hunt smarter, hunt harder.☆473Oct 29, 2025Updated 4 months ago
- A repository for tracking events related to the MOVEit Transfer Cl0p Campaign☆71Jul 19, 2023Updated 2 years ago
- Method of finding interesting domains using keywords + JARMs☆13Jan 30, 2023Updated 3 years ago
- Read Windows message table entries.☆11Feb 5, 2023Updated 3 years ago
- Collection of different Azure/Entra focused solutions (Deployable templates, Function Apps, etc)☆79Feb 28, 2026Updated last week
- This project aims to compare and evaluate the telemetry of various EDR products.☆1,930Jan 20, 2026Updated last month
- Azure Post Exploitation Framework☆244Oct 27, 2025Updated 4 months ago
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆117Oct 29, 2024Updated last year
- Threat feeds designed to extract adversarial TTPs and IOCs, using: ✨AI✨☆70Updated this week
- Live Feed of C2 servers, tools, and botnets☆751Mar 2, 2026Updated last week
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.☆53Oct 23, 2024Updated last year
- ☆16Jul 17, 2024Updated last year
- Hundred Days of Yara Challenge☆12Jun 21, 2022Updated 3 years ago
- A collection of PowerShell scripts for analyzing data from Microsoft 365 and Microsoft Entra ID☆577Dec 6, 2025Updated 3 months ago
- ☆771May 7, 2025Updated 10 months ago
- Public Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchers☆772Feb 8, 2026Updated last month
- TIM is a Kusto investigation platform that enables a user to quickly pivot between data sources; annotate their findings; and promotes co…☆23Aug 7, 2024Updated last year
- Documentation and tools to curate Sigma rules for Windows event logs into easier to parse rules.☆16Oct 22, 2025Updated 4 months ago
- 🐻❄️ 🏹 Threat hunting with Polars and flaws.cloud AWS CloudTrail datasets.☆14May 22, 2024Updated last year
- single-threaded event driven sleep obfuscation poc for linux☆38Jun 14, 2025Updated 8 months ago
- Group Policy Objects manipulation and exploitation framework☆296Dec 7, 2025Updated 3 months ago