eric-erki / threat-INTelLinks
Archive of publicly available threat INTel reports (mostly APT Reports but not limited to).
☆11Updated 7 years ago
Alternatives and similar repositories for threat-INTel
Users that are interested in threat-INTel are comparing it to the libraries listed below
Sorting:
- Threat Hunting Malware Infrastructure☆10Updated last year
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆87Updated 3 years ago
- Method of finding interesting domains using keywords + JARMs☆13Updated 2 years ago
- BlueBox Malware analysis Box and Cyber threat intelligence.☆43Updated 3 years ago
- ☆52Updated 3 months ago
- The project will serve as a central repository for VMware Threat Analysis Unit (TAU) to share threat intelligence with the security commu…☆17Updated 2 years ago
- Cyber Threat Intelligence Data, Indicators, and Analysis☆102Updated this week
- Small web frontend for using openAI's GPT-3.5 and GPT-4's API☆57Updated 7 months ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆106Updated 3 years ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆62Updated last year
- ☆19Updated last year
- ☆34Updated last week
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆61Updated 3 years ago
- Source code used at TweetFeed.live☆47Updated 3 years ago
- C2 Active Scanner☆60Updated last year
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆49Updated 3 years ago
- Lightweight Python-Based Malware Analysis Pipeline☆36Updated 2 months ago
- ☆67Updated 2 years ago
- Open IOC sharing platform☆63Updated last year
- IOC Data Obtained From Karakurt Hacking Team's Internal Infrastructure☆34Updated 3 years ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆115Updated 4 years ago
- Website defacement attack detection with deep learning☆62Updated 10 months ago
- Linux Evidence Acquisition Framework☆118Updated last year
- Data breaches, Leaks, Malwares Forums List <Please Use Vpn/TOR don't click on Link directly bad OPSEC>☆58Updated 2 months ago
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆27Updated 2 years ago
- yara detection rules for hunting with the threathunting-keywords project☆153Updated 6 months ago
- ☆22Updated 2 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- A cyber threat intelligence chatbot that ingested 2200+ reports from vx-underground.☆32Updated last year
- First iteration of ML based Feedback WAF☆59Updated last year