Curated Intelligence is working with analysts from around the world to provide useful information to organisations in Ukraine looking for additional free threat intelligence. Slava Ukraini. Glory to Ukraine.
☆937Jun 26, 2023Updated 2 years ago
Alternatives and similar repositories for Ukraine-Cyber-Operations
Users that are interested in Ukraine-Cyber-Operations are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Russia / Ukraine 2022 conflict related IOCs from CERT Orange Cyberdefense Threat Intelligence Datalake☆174Dec 9, 2022Updated 3 years ago
- Google and deepl translated conti leaks, which is shared by a member of the conti ransomware group.☆617Mar 16, 2022Updated 4 years ago
- A collection of papers, blogs, and resources that make up the quintessential aspects of cyber threat intelligence☆710Apr 21, 2025Updated 11 months ago
- A MITRE ATT&CK Lookup Tool☆46Apr 25, 2024Updated last year
- A collection of intelligence about Log4Shell and its exploitation activity.☆184Mar 4, 2022Updated 4 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Public Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchers☆779Feb 8, 2026Updated last month
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆118Oct 22, 2021Updated 4 years ago
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆6,698Updated this week
- API Security Project aims to present unique attack & defense methods in API Security field☆1,435Mar 5, 2024Updated 2 years ago
- Malwoverview is a rapid response tool used to gather intelligence information from VirusTotal, Hybrid Analysis, URLHaus, Polyswarm, Malsh…☆3,653Mar 11, 2026Updated 2 weeks ago
- Interesting APT Report Collection And Some Special IOCs☆2,956Updated this week
- A curated list of Awesome Threat Intelligence resources☆9,953Jan 19, 2026Updated 2 months ago
- A query aggregator for OSINT based threat hunting☆932Mar 7, 2026Updated 2 weeks ago
- APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the …☆1,405Nov 7, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Threat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysi…☆1,304Jun 1, 2023Updated 2 years ago
- The Threat Actor Profile Guide for CTI Analysts☆117Jul 15, 2023Updated 2 years ago
- Open Cyber Threat Intelligence Platform☆9,067Updated this week
- Collection of awesome resources on intelligence writing, including manuals/guides, standards, books, tranings, articles, videos, etc☆598Dec 4, 2025Updated 3 months ago
- APT & CyberCriminal Campaign Collection☆4,043Jul 25, 2024Updated last year
- A Cloud Forensics Powershell module to run threat hunting playbooks on data from Azure and O365☆790Oct 29, 2022Updated 3 years ago
- A list of cyber-chef recipes and curated links☆2,197Jun 14, 2024Updated last year
- Misc Threat Hunting Resources☆377Jan 26, 2023Updated 3 years ago
- Rapidly Search and Hunt through Windows Forensic Artefacts☆3,484Mar 2, 2026Updated 3 weeks ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,508Jan 12, 2026Updated 2 months ago
- ☆512Oct 7, 2024Updated last year
- A toolset to make a system look as if it was the victim of an APT attack☆2,723Sep 23, 2025Updated 6 months ago
- GOAL: Incident Response Playbooks Mapped to MITRE Attack Tactics and Techniques. [Contributors Friendly]☆1,548Jul 28, 2024Updated last year
- A collection of resources for Threat Hunters☆914Oct 15, 2024Updated last year
- RedEye is a visual analytic tool supporting Red & Blue Team operations☆2,744Oct 20, 2023Updated 2 years ago
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆283Mar 20, 2025Updated last year
- This repo is where I store my Threat Hunting ideas/content☆89Updated this week
- Main Sigma Rule Repository☆10,224Mar 19, 2026Updated last week
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- A browser extension for OSINT search☆1,752Updated this week
- Incident Response Documentation made easy. Developed by Incident Responders for Incident Responders☆1,064Oct 5, 2023Updated 2 years ago
- MISP (core software) - Open Source Threat Intelligence and Sharing Platform☆6,195Mar 20, 2026Updated last week
- Threat Box Assessment Tool☆19Mar 5, 2026Updated 3 weeks ago
- Automate the creation of a lab environment complete with security tooling and logging best practices☆4,921Jul 6, 2024Updated last year
- Community Detection Signature Build and Distribution Pipeline for YARA, Suricata, Snort and Sigma☆27Jun 20, 2023Updated 2 years ago
- Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups☆723Dec 26, 2022Updated 3 years ago