Collection of Cyber Threat Intelligence sources from the deep and dark web
☆6,585Updated this week
Alternatives and similar repositories for deepdarkCTI
Users that are interested in deepdarkCTI are comparing it to the libraries listed below
Sorting:
- A curated list of Awesome Threat Intelligence resources☆9,814Jan 19, 2026Updated last month
- Dark Web OSINT Tool☆3,786Jan 8, 2026Updated last month
- Open Cyber Threat Intelligence Platform☆8,893Updated this week
- the transparent ransomware claim tracker 🥷🏼🧅🖥️☆1,091Jun 17, 2025Updated 8 months ago
- OSINT Tools for the Dark Web☆1,626May 22, 2025Updated 9 months ago
- Malwoverview is a rapid response tool used to gather intelligence information from VirusTotal, Hybrid Analysis, URLHaus, Polyswarm, Malsh…☆3,548Jan 20, 2026Updated last month
- Public Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchers☆771Feb 8, 2026Updated 3 weeks ago
- A resource containing all the tools each ransomware gangs uses☆1,330Dec 24, 2025Updated 2 months ago
- Tools and Techniques for Red Team / Penetration Testing☆8,534Mar 18, 2025Updated 11 months ago
- Interesting APT Report Collection And Some Special IOCs☆2,915Updated this week
- A collection of papers, blogs, and resources that make up the quintessential aspects of cyber threat intelligence☆704Apr 21, 2025Updated 10 months ago
- The recursive internet scanner for hackers. 🧡☆9,450Updated this week
- Small and highly portable detection tests based on MITRE's ATT&CK.☆11,617Updated this week
- IntelOwl: manage your Threat Intelligence at scale☆4,467Updated this week
- This map lists the essential techniques to bypass anti-virus and EDR☆3,161Mar 28, 2025Updated 11 months ago
- game of active directory☆7,484Jul 16, 2025Updated 7 months ago
- AIL framework - Analysis Information Leak framework☆884Updated this week
- Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows…☆2,055Dec 11, 2024Updated last year
- Adversary Emulation Framework☆10,717Updated this week
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆6,498Jan 18, 2026Updated last month
- Open Source Intelligence Interface for Deep Web Scraping☆1,531Dec 29, 2025Updated 2 months ago
- The Havoc Framework☆8,190Dec 18, 2025Updated 2 months ago
- Yet another Ransomware gang tracker☆562Updated this week
- Rapidly Search and Hunt through Windows Forensic Artefacts☆3,452Feb 14, 2026Updated 2 weeks ago
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7,259Updated this week
- Main Sigma Rule Repository☆10,145Feb 19, 2026Updated last week
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,486Jan 12, 2026Updated last month
- Automated Adversary Emulation Platform☆6,761Feb 17, 2026Updated last week
- Live Feed of C2 servers, tools, and botnets☆749Updated this week
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆10,150Sep 29, 2025Updated 5 months ago
- A toolset to make a system look as if it was the victim of an APT attack☆2,715Sep 23, 2025Updated 5 months ago
- ✨ A curated list of awesome threat detection and hunting resources 🕵️♂️☆4,512Jan 5, 2026Updated last month
- SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.☆16,768Dec 15, 2024Updated last year
- OnionSearch is a script that scrapes urls on different .onion search engines.☆1,615Aug 8, 2024Updated last year
- Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.☆3,037Updated this week
- A curated list of amazingly awesome OSINT☆24,940Feb 4, 2026Updated 3 weeks ago
- APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the …☆1,400Nov 7, 2024Updated last year
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆2,155Feb 21, 2026Updated last week
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆75,488Feb 16, 2026Updated last week