A collection of methods to learn who the owner of an IP address is.
☆230Sep 29, 2025Updated 6 months ago
Alternatives and similar repositories for Attribution-to-IP
Users that are interested in Attribution-to-IP are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Invictus Threat Intelligence: IOCs and TTPs from blogs, research and more☆30Mar 31, 2026Updated 2 weeks ago
- A community-driven repository for threat hunting ideas, methodologies, and research that serves as a central gathering place for hunters …☆308Updated this week
- An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.☆203Jul 3, 2024Updated last year
- Finding ClickFix and FakeCAPTCHA like it's 1999☆135Mar 14, 2026Updated last month
- The Threat Actor Profile Guide for CTI Analysts☆119Jul 15, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆83Feb 4, 2026Updated 2 months ago
- Read Windows message table entries.☆11Feb 5, 2023Updated 3 years ago
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆118Oct 29, 2024Updated last year
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.☆53Oct 23, 2024Updated last year
- Live Feed of C2 servers, tools, and botnets☆772Apr 13, 2026Updated last week
- ☆34Apr 8, 2026Updated last week
- self-hosted Azure OSINT tool☆35Jun 24, 2025Updated 9 months ago
- ☆11Dec 9, 2025Updated 4 months ago
- Suzaku (朱雀) is a sigma-based threat hunting and fast forensics timeline generator for cloud logs.☆173Mar 29, 2026Updated 3 weeks ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Intel Retrieval Augmented Generation (RAG) Utilities☆90Jan 29, 2024Updated 2 years ago
- Cyber Underground General Intelligence Requirements☆98Feb 2, 2024Updated 2 years ago
- Threat feeds designed to extract adversarial TTPs and IOCs, using: ✨AI✨☆69Apr 5, 2026Updated 2 weeks ago
- A resource containing all the tools each ransomware gangs uses☆1,344Apr 1, 2026Updated 2 weeks ago
- Can you pay the ransom in your country?☆14Dec 18, 2023Updated 2 years ago
- A repository for tracking events related to the MOVEit Transfer Cl0p Campaign☆71Jul 19, 2023Updated 2 years ago
- This project aims to compare and evaluate the telemetry of various EDR products.☆1,945Mar 26, 2026Updated 3 weeks ago
- AIL project training materials☆39Feb 24, 2026Updated last month
- ☆109Dec 9, 2025Updated 4 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- SECurityTr8Ker monitors the SEC's RSS feed for 8-K filings with cybersecurity incident disclosures.☆89Jun 20, 2025Updated 10 months ago
- Exploits Unauth Docker API☆44Apr 18, 2025Updated last year
- PowerShell tools to help defenders hunt smarter, hunt harder.☆479Oct 29, 2025Updated 5 months ago
- A collection of files with indicators supporting social media posts from Palo Alto Network's Unit 42 team to disseminate timely threat in…☆492Updated this week
- Public Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchers☆785Feb 8, 2026Updated 2 months ago
- Method of finding interesting domains using keywords + JARMs☆13Jan 30, 2023Updated 3 years ago
- Repository where I hold random detection and threat hunting queries that I come up with based on different sources of information (or eve…☆280Dec 20, 2025Updated 4 months ago
- AppLocker Policy Generator☆26Aug 25, 2025Updated 7 months ago
- A collection of papers, blogs, and resources that make up the quintessential aspects of cyber threat intelligence☆715Apr 21, 2025Updated 11 months ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Collection of different Azure/Entra focused solutions (Deployable templates, Function Apps, etc)☆80Apr 12, 2026Updated last week
- Rust implementation, creating a scheduled task programmatically with user logon trigger.☆47Jun 10, 2025Updated 10 months ago
- Malware Analysis tools☆26Sep 14, 2024Updated last year
- ☆777May 7, 2025Updated 11 months ago
- Azure Post Exploitation Framework☆245Oct 27, 2025Updated 5 months ago
- A catalog of services that can be publicly exposed within different cloud providers.☆14Aug 30, 2024Updated last year
- A small go tool to upload JSON files to the BloodHound community edition API☆32May 29, 2024Updated last year