☆111Mar 3, 2026Updated this week
Alternatives and similar repositories for threat-intelligence
Users that are interested in threat-intelligence are comparing it to the libraries listed below
Sorting:
- This repository contains various threat hunting tools written in Python and is documented in the series Python Threat Hunting Tools which…☆18Nov 16, 2023Updated 2 years ago
- Automated threat intel feed parsing and consolidation💻👾🤖☆40Updated this week
- ioc2rpz webgui☆17Feb 13, 2026Updated 3 weeks ago
- Top domains list generated by Webshrinker and DNSFilter☆17Sep 30, 2024Updated last year
- This repository contains files from AppGate / Immunity Malware Analysis Team.☆21Oct 19, 2021Updated 4 years ago
- GPO Bypass is a tool / proof-of-concept that highlights how one can bypass Group Policy enforced policies. It uses Firefox as an example.☆14Jan 28, 2023Updated 3 years ago
- Tools for hunting security threats☆12Feb 4, 2020Updated 6 years ago
- Information about Progress MoveIT CVE☆11Jun 16, 2023Updated 2 years ago
- 🦉🔬A small PowerShell tool for finding information quickly on malicious IPs or FQDNs. Powershell threat hunting.☆11Jan 9, 2020Updated 6 years ago
- Splunk Add-on for Microsoft Azure☆11Dec 15, 2025Updated 2 months ago
- Splunk csv to KVStore ES Threat Intel☆11Jul 11, 2016Updated 9 years ago
- A collection of files with indicators supporting social media posts from Palo Alto Network's Unit 42 team to disseminate timely threat in…☆456Updated this week
- Labs for Threat Modelling training delivered by ControlPlane☆35Feb 24, 2026Updated last week
- Threat Simulator for Enterprise Networks☆14May 14, 2022Updated 3 years ago
- A project designed to make the operationalization of open-source cyber threat intelligence more efficient.☆17Updated this week
- Newly Registered Domains (NRD) lists generated from WhoisDS.com free database — daily domain lists for security and threat analysis.☆41Updated this week
- AIL project training materials☆39Feb 24, 2026Updated last week
- Indicators of compromise, YARA rules, and Python scripts to supplement the SANS CTI Summit 2021 talk: "xStart when you're ready".☆14Jul 12, 2021Updated 4 years ago
- Chrome/Chromium Forensic Tool : Parses History, Visited Links, Downloaded Files and Cache☆20Feb 4, 2024Updated 2 years ago
- Indicators of compromise☆17Jan 29, 2026Updated last month
- This repository hosts files relating to the TF-CSIRT Reference Security Incident Taxonomy Working Group.☆74Apr 4, 2025Updated 11 months ago
- Threat-Intel repository. API: https://github.com/davidonzo/apiosintDS☆162Oct 18, 2024Updated last year
- A DNS blocklist repo. Lists in various formats like AdGuard/Easylist, Pi-hole, HOSTS. Includes regex and wiki☆20Jan 23, 2026Updated last month
- CyberFind — a next-generation OSINT reconnaissance tool designed for cybersecurity professionals, penetration testers, and digital invest…☆58Updated this week
- This repository contains supplemental items including IOCs, and signatures discussed in Huntress blogposts, and other media.☆47Feb 27, 2026Updated last week
- Event Tracing for Windows Custom Events☆21Jan 28, 2015Updated 11 years ago
- ☆27May 6, 2024Updated last year
- CloudGrappler is a purpose-built tool designed for effortless querying of high-fidelity and single-event detections related to well-known…☆266Nov 21, 2025Updated 3 months ago
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆51Apr 25, 2024Updated last year
- A repository of telemetry domains and URLs used by mobile location tracking, user profiling, targeted marketing and aggressive ads librar…☆194Feb 15, 2026Updated 3 weeks ago
- Wazuh extension looking up alert data against indicators in OpenCTI threat intel☆21Feb 4, 2024Updated 2 years ago
- An IP list of bad actors targeting public infra like website, ssh endpoints, etc.☆21Mar 2, 2026Updated last week
- ☆23Jul 27, 2023Updated 2 years ago
- A list of transforms for searching Red, Yellow, and UNSC notices by Name or Phrase.☆25Jun 15, 2023Updated 2 years ago
- RBA is Splunk's method to aggregate low-fidelity security events as interesting observations tagged with security metadata to create high…☆63Mar 2, 2026Updated last week
- A pcap capture analysis helper☆25Aug 30, 2023Updated 2 years ago
- Local CLI tool for browser extension risk analysis☆27Apr 11, 2025Updated 10 months ago
- The simplest way to find how to report abusive domains☆53May 8, 2023Updated 2 years ago
- My malware analysis code snippets☆28Jul 15, 2023Updated 2 years ago