This repository contains supplemental items including IOCs, and signatures discussed in Huntress blogposts, and other media.
☆47Feb 27, 2026Updated last month
Alternatives and similar repositories for threat-intel
Users that are interested in threat-intel are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Indicators of compromise from to analysis and research by Nextron Threat Research team☆12Sep 17, 2025Updated 7 months ago
- ☆16Mar 22, 2023Updated 3 years ago
- ☆11Jun 12, 2023Updated 2 years ago
- Bulk indicator VirusTotal lookups supporting file hashes, domains and IPs.☆13May 28, 2025Updated 10 months ago
- ☆44Jul 11, 2025Updated 9 months ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- A proof-of-concept re-assembler for reverse VNC traffic.☆24May 21, 2023Updated 2 years ago
- Everything related to YARA☆16Feb 19, 2026Updated 2 months ago
- Yara Rules for Modern Malware☆79Mar 3, 2024Updated 2 years ago
- Indicators of Normality☆11Jul 22, 2022Updated 3 years ago
- Indicators of compromise☆17Jan 29, 2026Updated 2 months ago
- A collection of various SIEM rules relating to malware family groups.☆69Jun 18, 2024Updated last year
- An AD CS toolkit for AD Admins, Defensive Security Professionals, and Filthy Red Teamers☆43Apr 7, 2026Updated last week
- A repository of my own Sigma detection rules.☆165Nov 25, 2025Updated 4 months ago
- ☆96Apr 8, 2026Updated last week
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- SACTI - Securely aggregate CTI sightings and report them on MISP☆14Oct 24, 2022Updated 3 years ago
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆88Mar 11, 2026Updated last month
- ☆15Nov 25, 2021Updated 4 years ago
- ☆14Mar 9, 2023Updated 3 years ago
- ☆56Apr 8, 2026Updated last week
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆55Apr 11, 2026Updated last week
- ☆32Mar 11, 2026Updated last month
- ☆80Sep 29, 2025Updated 6 months ago
- MSIX Building Made Easy for Defenders☆64Aug 25, 2025Updated 7 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆21May 8, 2022Updated 3 years ago
- Examine Chrome extensions for security issues☆96Nov 16, 2025Updated 5 months ago
- A pySigma wrapper and langchain toolkit for automatic rule creation/translation☆93Nov 3, 2025Updated 5 months ago
- bad stuffs by bad guys☆49Jul 28, 2022Updated 3 years ago
- Repository where I hold random detection and threat hunting queries that I come up with based on different sources of information (or eve…☆280Dec 20, 2025Updated 3 months ago
- ☆78Feb 19, 2026Updated 2 months ago
- Creating an ATT&CK Navigator layer with the detection coverage of the signals available within Tanium Threat Response.☆12Jun 2, 2021Updated 4 years ago
- A collection of files with indicators supporting social media posts from Palo Alto Network's Unit 42 team to disseminate timely threat in…☆490Apr 8, 2026Updated last week
- ☆52Sep 1, 2025Updated 7 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Malware that we analyzed on our site.☆27Nov 12, 2025Updated 5 months ago
- Collection of my own detection rules☆20Jan 6, 2026Updated 3 months ago
- ☆20Jan 20, 2023Updated 3 years ago
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.☆53Oct 23, 2024Updated last year
- Native C++ access to Active Directory over ADWS, no .NET, no WCF, no HTTP stack.☆65Mar 27, 2026Updated 3 weeks ago
- Simple unpacking script for Ezuri ELF Crypter☆37Jul 28, 2021Updated 4 years ago
- ☆13Feb 10, 2021Updated 5 years ago