facebook / threat-researchView external linksLinks
Welcome to the Meta Threat Research Indicator Repository, a dedicated resource for the sharing of Indicators of Compromise (IOCs) and other threat indicators with the external research community
☆176Dec 11, 2025Updated 2 months ago
Alternatives and similar repositories for threat-research
Users that are interested in threat-research are comparing it to the libraries listed below
Sorting:
- Setup Conversion Leads API integration using Salesforce APEX triggers on Lead objects☆19Mar 22, 2023Updated 2 years ago
- Indicators of Compromise (IOCs) accompanying HP Threat Research blog posts and reports.☆29Apr 10, 2024Updated last year
- Indicators of compromise☆17Jan 29, 2026Updated 2 weeks ago
- Javascript implementation of the Ristretto255 group operations, built on top of the popular TweetNaCl.js crypto library☆33Dec 13, 2023Updated 2 years ago
- This repository is for Indicators of Compromise (IOCs) from Zscaler ThreatLabz public reports☆79Jan 26, 2026Updated 2 weeks ago
- ☆22Feb 4, 2026Updated last week
- A rust based DLL injection project☆31Sep 18, 2022Updated 3 years ago
- Quick lookup files for SUNBURST Backdoor☆12Dec 15, 2020Updated 5 years ago
- openaps driver for Dexcom G4 with Share BLE☆11Sep 13, 2017Updated 8 years ago
- A Python client for the Global CVE Allocation System.☆17Jan 31, 2026Updated 2 weeks ago
- Malware - Machine Learning☆11Mar 24, 2018Updated 7 years ago
- Python Library for ConfigExtractor☆14Feb 4, 2026Updated last week
- This project enabled intercepting and virtualizing the browser API☆45Updated this week
- bad stuffs by bad guys☆49Jul 28, 2022Updated 3 years ago
- Post Processor for Facebook Static Analysis Tools.☆140Updated this week
- Swift code to parse the quarantine history database, Chrome history database, Safari history database, and Firefox history database on ma…☆15Dec 3, 2020Updated 5 years ago
- Synapse Rapid Power-up for SinkDB☆11Jun 24, 2025Updated 7 months ago
- Experience Lab is a set of utilities that assist in creating instances of Microsoft Azure Data Manager for Energy, performing data loads,…☆16Oct 2, 2024Updated last year
- A script to test for subdomain takeovers from a list of domains☆12Feb 18, 2023Updated 2 years ago
- ☆18Jan 31, 2025Updated last year
- [ARCHIVED -- USE TXT2DETECTION] A command line tool that converts Sigma Rules into STIX 2.1 Objects.☆12Jan 13, 2025Updated last year
- BICs (Bridge IC) are standalone devices deployed within a Data Center that enable monitoring a multi-host system using a single BMC devic…☆63Updated this week
- ☆18Dec 6, 2022Updated 3 years ago
- Suite for Information gathering☆12Jul 2, 2018Updated 7 years ago
- ☆20May 30, 2025Updated 8 months ago
- Virtual machine detection. This is done by looking at registry keys, processes, files, internet access and specs such as disk storage, RA…☆18Oct 8, 2021Updated 4 years ago
- Python 3 library to build YARA rules.☆13Oct 24, 2021Updated 4 years ago
- A collection of tools adversaries commonly use in an attack.☆14Nov 23, 2024Updated last year
- This repository contains C# code to synchronize database schemas from Azure Data Explorer (Kusto) to yaml files and back.☆16Jan 19, 2026Updated 3 weeks ago
- Threatfox Censys is a tool to query Censys Search for IP addresses and domains and then parses the JSON and submits the results to Threat…☆36Jan 8, 2026Updated last month
- Prelude for the Buck2 project☆61Updated this week
- Augmentation to Machine Readable CTI☆37Sep 9, 2025Updated 5 months ago
- Collection of videos of Raids on Cybercriminals☆21Mar 19, 2025Updated 10 months ago
- YARA Rule Strings Statistics Calculator and Malware Research Helper☆14Jul 24, 2021Updated 4 years ago
- ☆15May 26, 2021Updated 4 years ago
- A library to provide calculations between Chef diffs.☆57Feb 6, 2026Updated last week
- A scanner that files with compromised or untrusted code signing certificates written in python.☆65Sep 6, 2023Updated 2 years ago
- This repo contains the APK to follow along with my "Beautifying Android Native Code" Video on Youtube☆12May 31, 2023Updated 2 years ago
- Master copies of the DISARM frameworks, with generated files to help you explore the data☆261Jan 29, 2026Updated 2 weeks ago