This repository contains supplemental items including IOCs, and signatures discussed in Huntress blogposts, and other media.
☆48Feb 27, 2026Updated 2 months ago
Alternatives and similar repositories for threat-intel
Users that are interested in threat-intel are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Indicators of compromise from to analysis and research by Nextron Threat Research team☆12Sep 17, 2025Updated 7 months ago
- ☆16Mar 22, 2023Updated 3 years ago
- ☆11Jun 12, 2023Updated 2 years ago
- Bulk indicator VirusTotal lookups supporting file hashes, domains and IPs.☆13May 28, 2025Updated 11 months ago
- ☆44Jul 11, 2025Updated 9 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A proof-of-concept re-assembler for reverse VNC traffic.☆24May 21, 2023Updated 2 years ago
- Everything related to YARA☆16Apr 18, 2026Updated 3 weeks ago
- Public Chronicle Detection Rules☆12Apr 25, 2023Updated 3 years ago
- Yara Rules for Modern Malware☆80Mar 3, 2024Updated 2 years ago
- Indicators of Normality☆11Jul 22, 2022Updated 3 years ago
- Indicators of compromise☆17Jan 29, 2026Updated 3 months ago
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆103Mar 21, 2026Updated last month
- A collection of various SIEM rules relating to malware family groups.☆69Jun 18, 2024Updated last year
- An AD CS toolkit for AD Admins, Defensive Security Professionals, and Filthy Red Teamers☆58Updated this week
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- SQL, IIS, Oh My...☆21Feb 24, 2025Updated last year
- A repository of my own Sigma detection rules.☆165Nov 25, 2025Updated 5 months ago
- ☆22Dec 22, 2020Updated 5 years ago
- ☆96Apr 8, 2026Updated last month
- SACTI - Securely aggregate CTI sightings and report them on MISP☆14Oct 24, 2022Updated 3 years ago
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆89Mar 11, 2026Updated last month
- ☆15Nov 25, 2021Updated 4 years ago
- ☆14Mar 9, 2023Updated 3 years ago
- ☆57Apr 16, 2026Updated 3 weeks ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆56May 1, 2026Updated last week
- ☆32Mar 11, 2026Updated last month
- ☆82Sep 29, 2025Updated 7 months ago
- Get started using Synapse Open-Source to start a Cortex and perform analysis within your area of expertise.☆52May 16, 2022Updated 3 years ago
- MSIX Building Made Easy for Defenders☆64Aug 25, 2025Updated 8 months ago
- ☆21May 8, 2022Updated 4 years ago
- A pySigma wrapper and langchain toolkit for automatic rule creation/translation☆93Nov 3, 2025Updated 6 months ago
- bad stuffs by bad guys☆49Jul 28, 2022Updated 3 years ago
- Repository where I hold random detection and threat hunting queries that I come up with based on different sources of information (or eve…☆281Dec 20, 2025Updated 4 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Elastic Security detection content for Endpoint☆1,427Updated this week
- A few quick recipes for those that do not have much time during the day☆22Oct 28, 2024Updated last year
- Creating an ATT&CK Navigator layer with the detection coverage of the signals available within Tanium Threat Response.☆12Jun 2, 2021Updated 4 years ago
- ☆78Feb 19, 2026Updated 2 months ago
- ☆52Sep 1, 2025Updated 8 months ago
- A collection of files with indicators supporting social media posts from Palo Alto Network's Unit 42 team to disseminate timely threat in…☆513Updated this week
- Malware that we analyzed on our site.☆26Nov 12, 2025Updated 5 months ago