A commercial grade threat intelligence feed thats validated and updated every half hour.
☆19Mar 24, 2023Updated 3 years ago
Alternatives and similar repositories for gnx-threat-intelligence
Users that are interested in gnx-threat-intelligence are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Staging blacklist/whitelist/customlist repo for dnswarden☆24Apr 25, 2026Updated last week
- IOCs for various malware families☆11Jul 18, 2024Updated last year
- Colection of different JUMPSEC advisories, guidance, and scripts for all of the latest vulnerabilities and adversaries☆13Oct 18, 2021Updated 4 years ago
- Aggregated Indicators of Compromise collected and cross-verified from multiple open and community-supported sources, enriched and ranked …☆36Aug 19, 2024Updated last year
- PiHole Lists☆15Updated this week
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- No gimmick DoH stub resolver☆19Mar 22, 2023Updated 3 years ago
- Malicious URLs and IP Addresses compiled by USOM (Computer Emergency Response Team of Turkey), updated once a day.☆22Apr 29, 2026Updated last week
- Very basic CLI SIEM (Security Information and Event Management system).☆41Mar 24, 2018Updated 8 years ago
- Sigma rules converted for direct use with Zircolite☆14Apr 29, 2026Updated last week
- Malicious URLs identified by scanning various public URL sources using the Google Safe Browsing API (over 6 billion URLs scanned daily)☆69Updated this week
- Modular command-line threat hunting tool & framework.☆17Jul 20, 2020Updated 5 years ago
- A suite of Volatility 3 plugins for memory forensics of Docker containers☆18Jan 10, 2024Updated 2 years ago
- Virus Total Free - IOC parser and report generator☆25Mar 19, 2023Updated 3 years ago
- A high-performance Python library for automating AdGuard filter list management. Create, deduplicate, sort, optimize, and validate ad-blo…☆18Updated this week
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Indicators of Compromise (IOCs) accompanying HP Threat Research blog posts and reports.☆28Apr 10, 2024Updated 2 years ago
- YAFRA is a semi-automated framework for analyzing and representing reports about IT Security incidents.☆27Dec 14, 2021Updated 4 years ago
- 👨💻🕵🏻👩💻 Analyze user behavior against fake access points📡☆30Jul 23, 2018Updated 7 years ago
- A big domain block list - 200000+ lines☆59Updated this week
- Plug-ins for AlienVault of course.☆16Jul 5, 2017Updated 8 years ago
- ☆22Aug 29, 2024Updated last year
- This script will generate hashes (MD5, SHA1, SHA256), submit the MD5 to Virus Total, and produce a text file with the results.☆15Jul 13, 2023Updated 2 years ago
- Unique host templates to enhance own privacy in games, websites and regulary software on Desktop and Android devices☆109Dec 3, 2025Updated 5 months ago
- APT34/OILRIG leak☆11Jun 25, 2019Updated 6 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Two plugins to recover TMP keys from Saleae logic analyser traces☆15Jun 10, 2022Updated 3 years ago
- A blocklist for Pihole from PhishTank☆29Jun 17, 2023Updated 2 years ago
- Blocklist compilation and deduplication☆27May 21, 2022Updated 3 years ago
- a-ray-grass is a yara module that provides support for DCSO-format bloom filters in yara. In the context of hashlookup, it allows quickly…☆14Aug 19, 2022Updated 3 years ago
- IOC Data Obtained From Karakurt Hacking Team's Internal Infrastructure☆34Apr 22, 2022Updated 4 years ago
- Le mode héros de wakfu dans dofus retro☆15May 31, 2023Updated 2 years ago
- Launcher and injector for Dofus Retro☆11Dec 13, 2022Updated 3 years ago
- A blocklist for AdGuard and Pi-hole which combines many of the best blocklists☆28Updated this week
- A series of functions to parse Teamviewer logs to answer specific questions☆10Jul 17, 2022Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Phishing can't get any easier with Tilapia☆11Jan 2, 2023Updated 3 years ago
- Finds dynamic DNS (like no-ip.org) domains from a given list of domains☆14Sep 17, 2015Updated 10 years ago
- Ransomware dataset, containing dynamic behaviour of more than 60 distinct ransomware families.☆10Aug 29, 2022Updated 3 years ago
- uBlacklist blacklist - Fake webstores - Blocks fake machine-translated web stores that only redirect you to AliExpress. I have added vari…☆13Jan 17, 2026Updated 3 months ago
- Threat intelligence or Cyber Threat Intelligence is the process of identifying and analyzing gathered information about past, current, an…☆13Feb 18, 2024Updated 2 years ago
- Argon2 key derivation for Ruby☆11Apr 4, 2026Updated last month
- ☆45Dec 15, 2021Updated 4 years ago