No longer maintained. Please refer to Google Threat Intelligence / Virus Total collections.
☆63Apr 3, 2026Updated 2 weeks ago
Alternatives and similar repositories for threat-team
Users that are interested in threat-team are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Indicators of compromise☆17Jan 29, 2026Updated 2 months ago
- An experimental Velociraptor implementation using cloud infrastructure☆26Dec 2, 2025Updated 4 months ago
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆28Jul 15, 2024Updated last year
- Globally distributed honeypots and HoneyNets IOCs and file reversing☆16Apr 22, 2024Updated last year
- ☆18Oct 28, 2025Updated 5 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- This repository is for Indicators of Compromise (IOCs) from Zscaler ThreatLabz public reports☆79Jan 26, 2026Updated 2 months ago
- Toolchains for cross compilation and cross testing for Rust.☆22Jan 30, 2026Updated 2 months ago
- A stager and implant that executes remote Web Assembly☆64Feb 4, 2026Updated 2 months ago
- Mirror site speedtest☆12Dec 4, 2023Updated 2 years ago
- A Post-exploitation Toolset for Interacting with the Microsoft Graph API☆15Nov 16, 2023Updated 2 years ago
- ☆10Oct 22, 2017Updated 8 years ago
- Information about the open-source-dfir slack community☆30Jun 17, 2023Updated 2 years ago
- Collection of generic YARA rules☆16Mar 18, 2026Updated last month
- This repository contains OpenIOC rules to aid in hunting for indicators of compromise and TTPs focused on Advanced Persistent Threat grou…☆26Oct 3, 2023Updated 2 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆22Apr 11, 2026Updated last week
- Mass bruteforce authentication of common services with common credentials.☆54Dec 2, 2023Updated 2 years ago
- IOCs published by Black Lotus Labs☆140Apr 8, 2026Updated last week
- A collection of powershell scripts that are designed to be ran from a Microsoft Defender for Endpoint Live Response terminal, utilizing o…☆12Apr 26, 2023Updated 2 years ago
- IOCs and detection script for COATHANGER malware☆55Feb 7, 2024Updated 2 years ago
- A status page for uptimerobot.☆10Nov 10, 2018Updated 7 years ago
- A VSCode plugin to assist with BOF development.☆37Aug 14, 2024Updated last year
- A tweaked version of SdFat to improve block read speed☆11Nov 23, 2015Updated 10 years ago
- EvtPsst☆55Oct 24, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Simple, production ready, HTTP server for static file serving☆12Apr 1, 2023Updated 3 years ago
- Disk Image Mounting Script☆11Jan 22, 2026Updated 2 months ago
- Scripts and tools accompanying HP Threat Research blog posts and reports.☆50Apr 10, 2024Updated 2 years ago
- Bring Your Own Mitre Att&ck © Matrix !☆13Oct 19, 2023Updated 2 years ago
- Rules shared by the community from 100 Days of YARA 2025☆38Jan 2, 2026Updated 3 months ago
- An Obsidian.md theme inspired by the Cosmodium CyberSecurity colorway.☆19Mar 5, 2024Updated 2 years ago
- A library and command line tool for extracting indicators of compromise (IOCs) from security reports in PDF, HTML, Word, or text format☆52Mar 20, 2026Updated 3 weeks ago
- Secure Anti-Forensics and Total Annihilation of iNformation. Advanced counter-forensics tool to make storage data unrecoverable. Multi-pa…☆10Mar 13, 2025Updated last year
- A proving grounds for young and aspiring BBOT modules☆15Apr 1, 2026Updated 2 weeks ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Vagrant Files to create a Virtualbox VM for Malware Analysis☆13Jun 1, 2021Updated 4 years ago
- Thor Artifacts for Velociraptor☆19Dec 2, 2025Updated 4 months ago
- ☆87Nov 18, 2022Updated 3 years ago
- BOF for Havoc that copies locked Windows files (SAM, SYSTEM, NTDS.dit) via raw MFT parsing — no VSS, no Registry APIs, no PowerShell☆118Apr 6, 2026Updated last week
- QR code Ghostmode☆27Jul 30, 2025Updated 8 months ago
- Threat Intel IoCs + bits and pieces of dark matter. Published by Gen Threat Labs.☆445Apr 7, 2026Updated last week
- Realtime Face Mask Detection in ~10 lines of Python Code☆10Nov 10, 2020Updated 5 years ago