Curated Intelligence is working with analysts from around the world to provide useful information to organisations in Ukraine looking for additional free threat intelligence. Slava Ukraini. Glory to Ukraine.
☆936Jun 26, 2023Updated 2 years ago
Alternatives and similar repositories for Ukraine-Cyber-Operations
Users that are interested in Ukraine-Cyber-Operations are comparing it to the libraries listed below
Sorting:
- Russia / Ukraine 2022 conflict related IOCs from CERT Orange Cyberdefense Threat Intelligence Datalake☆174Dec 9, 2022Updated 3 years ago
- A collection of papers, blogs, and resources that make up the quintessential aspects of cyber threat intelligence☆706Apr 21, 2025Updated 10 months ago
- Google and deepl translated conti leaks, which is shared by a member of the conti ransomware group.☆616Mar 16, 2022Updated 3 years ago
- A collection of intelligence about Log4Shell and its exploitation activity.☆184Mar 4, 2022Updated 4 years ago
- Public Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchers☆772Feb 8, 2026Updated 3 weeks ago
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆6,609Updated this week
- Malwoverview is a rapid response tool used to gather intelligence information from VirusTotal, Hybrid Analysis, URLHaus, Polyswarm, Malsh…☆3,547Jan 20, 2026Updated last month
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆117Oct 22, 2021Updated 4 years ago
- API Security Project aims to present unique attack & defense methods in API Security field☆1,432Mar 5, 2024Updated 2 years ago
- A query aggregator for OSINT based threat hunting☆930Jan 23, 2026Updated last month
- Impulse Denial-of-service ToolKit☆2,740Apr 10, 2025Updated 10 months ago
- Interesting APT Report Collection And Some Special IOCs☆2,929Updated this week
- A MITRE ATT&CK Lookup Tool☆46Apr 25, 2024Updated last year
- The Threat Actor Profile Guide for CTI Analysts☆116Jul 15, 2023Updated 2 years ago
- Threat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysi…☆1,300Jun 1, 2023Updated 2 years ago
- A list of cyber-chef recipes and curated links☆2,188Jun 14, 2024Updated last year
- Open Cyber Threat Intelligence Platform☆8,960Updated this week
- APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the …☆1,402Nov 7, 2024Updated last year
- A Cloud Forensics Powershell module to run threat hunting playbooks on data from Azure and O365☆790Oct 29, 2022Updated 3 years ago
- A curated list of Awesome Threat Intelligence resources☆9,847Jan 19, 2026Updated last month
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,492Jan 12, 2026Updated last month
- Misc Threat Hunting Resources☆377Jan 26, 2023Updated 3 years ago
- APT & CyberCriminal Campaign Collection☆4,043Jul 25, 2024Updated last year
- RedEye is a visual analytic tool supporting Red & Blue Team operations☆2,740Oct 20, 2023Updated 2 years ago
- Rapidly Search and Hunt through Windows Forensic Artefacts☆3,460Updated this week
- ☆512Oct 7, 2024Updated last year
- GOAL: Incident Response Playbooks Mapped to MITRE Attack Tactics and Techniques. [Contributors Friendly]☆1,544Jul 28, 2024Updated last year
- Collection of awesome resources on intelligence writing, including manuals/guides, standards, books, tranings, articles, videos, etc☆594Dec 4, 2025Updated 3 months ago
- Incident Response Documentation made easy. Developed by Incident Responders for Incident Responders☆1,061Oct 5, 2023Updated 2 years ago
- A toolset to make a system look as if it was the victim of an APT attack☆2,714Sep 23, 2025Updated 5 months ago
- A browser extension for OSINT search☆1,734Updated this week
- Your Everyday Threat Intelligence☆1,954Feb 12, 2026Updated 3 weeks ago
- List of companies or individuals offering cybersecurity services, data, or other tangible assets to assist in Ukraine's defense of its in…☆67Apr 8, 2022Updated 3 years ago
- Automate the creation of a lab environment complete with security tooling and logging best practices☆4,908Jul 6, 2024Updated last year
- Main Sigma Rule Repository☆10,156Updated this week
- Tools for hunting for threats.☆599Apr 30, 2025Updated 10 months ago
- Resources for DFIR Professionals Responding to the REvil Ransomware Kaseya Supply Chain Attack☆180Jul 6, 2021Updated 4 years ago
- TweetFeed collects Indicators of Compromise (IOCs) shared by the infosec community at Twitter. Here you will find malicious URLs, domains…☆637Updated this week
- Malware similarity platform with modularity in mind.☆80Jul 18, 2021Updated 4 years ago