huntresslabs / threat-intelView external linksLinks
This repository contains supplemental items including IOCs, and signatures discussed in Huntress blogposts, and other media.
☆47Feb 8, 2026Updated last week
Alternatives and similar repositories for threat-intel
Users that are interested in threat-intel are comparing it to the libraries listed below
Sorting:
- Indicators of compromise from to analysis and research by Nextron Threat Research team☆12Sep 17, 2025Updated 4 months ago
- A proof-of-concept re-assembler for reverse VNC traffic.☆24May 21, 2023Updated 2 years ago
- ☆44Jul 11, 2025Updated 7 months ago
- Bulk indicator VirusTotal lookups supporting file hashes, domains and IPs.☆12May 28, 2025Updated 8 months ago
- Indicators of Normality☆11Jul 22, 2022Updated 3 years ago
- ☆16Mar 22, 2023Updated 2 years ago
- Everything related to YARA☆16Updated this week
- SACTI - Securely aggregate CTI sightings and report them on MISP☆14Oct 24, 2022Updated 3 years ago
- ☆96May 5, 2025Updated 9 months ago
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆103Jul 10, 2025Updated 7 months ago
- ☆14Mar 9, 2023Updated 2 years ago
- A collection of various SIEM rules relating to malware family groups.☆70Jun 18, 2024Updated last year
- Indicators of compromise☆17Jan 29, 2026Updated 2 weeks ago
- A repository of my own Sigma detection rules.☆163Nov 25, 2025Updated 2 months ago
- ☆54Feb 2, 2026Updated 2 weeks ago
- ☆21May 8, 2022Updated 3 years ago
- Yara Rules for Modern Malware☆78Mar 3, 2024Updated last year
- ☆15Nov 25, 2021Updated 4 years ago
- Examine Chrome extensions for security issues☆94Nov 16, 2025Updated 3 months ago
- ShellSweeping the evil.☆53Jun 18, 2024Updated last year
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆53Feb 6, 2026Updated last week
- ☆78Sep 29, 2025Updated 4 months ago
- bad stuffs by bad guys☆49Jul 28, 2022Updated 3 years ago
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.☆53Oct 23, 2024Updated last year
- Get started using Synapse Open-Source to start a Cortex and perform analysis within your area of expertise.☆50May 16, 2022Updated 3 years ago
- A pySigma wrapper and langchain toolkit for automatic rule creation/translation☆91Nov 3, 2025Updated 3 months ago
- A few quick recipes for those that do not have much time during the day☆22Oct 28, 2024Updated last year
- ☆22Dec 22, 2020Updated 5 years ago
- CLI tool to compute the TypeRefHash for .NET binaries.☆19Nov 10, 2021Updated 4 years ago
- Microsoft Sentinel, Defender for Endpoint - KQL Detection Packs☆55Jul 20, 2023Updated 2 years ago
- I read 20 years of mostly-fail at cyber norms at the UN, and now you can too!☆20Mar 21, 2018Updated 7 years ago
- ☆20Jan 20, 2023Updated 3 years ago
- Repository where I hold random detection and threat hunting queries that I come up with based on different sources of information (or eve…☆277Dec 20, 2025Updated last month
- ☆102Dec 9, 2025Updated 2 months ago
- My first trial at Ethical Hacking Write Ups☆23Jul 23, 2020Updated 5 years ago
- This content is analysis and research of the data sources currently listed in ATT&CK.☆415Sep 13, 2023Updated 2 years ago
- ☆51Sep 1, 2025Updated 5 months ago
- Malware that we analyzed on our site.☆26Nov 12, 2025Updated 3 months ago
- pocket guide for core threat hunting concepts☆23May 6, 2020Updated 5 years ago