eric-erki / threat-INTelLinks
Archive of publicly available threat INTel reports (mostly APT Reports but not limited to).
☆11Updated 7 years ago
Alternatives and similar repositories for threat-INTel
Users that are interested in threat-INTel are comparing it to the libraries listed below
Sorting:
- Threat Hunting Malware Infrastructure☆10Updated last year
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆87Updated 3 years ago
- The project will serve as a central repository for VMware Threat Analysis Unit (TAU) to share threat intelligence with the security commu…☆17Updated 2 years ago
- Method of finding interesting domains using keywords + JARMs☆13Updated 2 years ago
- ☆19Updated last year
- This repository contains OpenIOC rules to aid in hunting for indicators of compromise and TTPs focused on Advanced Persistent Threat grou…☆25Updated 2 years ago
- BlueBox Malware analysis Box and Cyber threat intelligence.☆43Updated 3 years ago
- Daily C2 threat intelligence feed☆18Updated this week
- C2 Active Scanner☆60Updated last year
- ☆34Updated this week
- An Adaptive Misuse Detection System☆44Updated 11 months ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- Lightweight Python-Based Malware Analysis Pipeline☆35Updated 3 weeks ago
- ☆52Updated last month
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆114Updated 3 years ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆106Updated 3 years ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆28Updated 2 years ago
- Specific C2 Detection Tool Written To Detect C2 Servers From RisePro Stealer Malware.☆13Updated last year
- Cyber Threat Intelligence Data, Indicators, and Analysis☆97Updated 2 months ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆62Updated last year
- Source code used at TweetFeed.live☆46Updated 2 years ago
- yara detection rules for hunting with the threathunting-keywords project☆150Updated 5 months ago
- ☆67Updated 2 years ago
- Open IOC sharing platform☆61Updated 11 months ago
- Lazarus analysis tools and research report☆56Updated last year
- Yara Rules for Modern Malware☆79Updated last year
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆61Updated 2 years ago
- ☆33Updated this week
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆48Updated 2 years ago
- ☆96Updated 5 months ago