β116Mar 19, 2026Updated last week
Alternatives and similar repositories for threat-intelligence
Users that are interested in threat-intelligence are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ioc2rpz is a place where threat intelligence meets DNS.β114Feb 28, 2026Updated last month
- Automated threat intel feed parsing and consolidationπ»πΎπ€β41Updated this week
- Splunk Add-on for Microsoft Azureβ11Dec 15, 2025Updated 3 months ago
- Top domains list generated by Webshrinker and DNSFilterβ17Sep 30, 2024Updated last year
- This repository contains various threat hunting tools written in Python and is documented in the series Python Threat Hunting Tools whichβ¦β18Nov 16, 2023Updated 2 years ago
- Simple, predictable pricing with DigitalOcean hosting β’ AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- π¦π¬A small PowerShell tool for finding information quickly on malicious IPs or FQDNs. Powershell threat hunting.β11Jan 9, 2020Updated 6 years ago
- Splunk csv to KVStore ES Threat Intelβ11Jul 11, 2016Updated 9 years ago
- This repository contains files from AppGate / Immunity Malware Analysis Team.β21Oct 19, 2021Updated 4 years ago
- AIL project training materialsβ39Feb 24, 2026Updated last month
- Pure Python netflow and DNS correlation, with reusable Frame Streams, DnsTap and Protobuf implementationsβ17Aug 30, 2025Updated 6 months ago
- A collection of files with indicators supporting social media posts from Palo Alto Network's Unit 42 team to disseminate timely threat inβ¦β482Updated this week
- Newly Registered Domains (NRD) lists generated from WhoisDS.com free database β daily domain lists for security and threat analysis.β42Updated this week
- Awesome Splunk SPL hunt queries that can be used to detect the latest vulnerability exploitation attempts & subsequent compromiseβ68Apr 29, 2024Updated last year
- A commercial grade threat intelligence feed thats validated and updated every half hour.β19Mar 24, 2023Updated 3 years ago
- Wordpress hosting with auto-scaling on Cloudways β’ AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A tool to automatically reclaim disk space on your media server by intelligently deleting content from Jellyfin, Sonarr, and Radarr basedβ¦β44Nov 18, 2025Updated 4 months ago
- This repository contains supplemental items including IOCs, and signatures discussed in Huntress blogposts, and other media.β47Feb 27, 2026Updated last month
- Threat-Intel repository. API: https://github.com/davidonzo/apiosintDSβ163Oct 18, 2024Updated last year
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users inβ¦β35Oct 21, 2025Updated 5 months ago
- β10Sep 12, 2024Updated last year
- A library that scrapes Linkedin for user dataβ24May 12, 2021Updated 4 years ago
- https://academy.tcm-sec.com/β14Aug 19, 2025Updated 7 months ago
- β21Aug 17, 2018Updated 7 years ago
- Indicators of Compromise (IOCs) accompanying HP Threat Research blog posts and reports.β29Apr 10, 2024Updated last year
- Wordpress hosting with auto-scaling on Cloudways β’ AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Research into Undocumented Behavior of Azure AD Refresh Tokensβ13Oct 27, 2023Updated 2 years ago
- Wazuh extension looking up alert data against indicators in OpenCTI threat intelβ21Feb 4, 2024Updated 2 years ago
- β16Mar 19, 2026Updated last week
- CloudGrappler is a purpose-built tool designed for effortless querying of high-fidelity and single-event detections related to well-knownβ¦β266Nov 21, 2025Updated 4 months ago
- A project designed to make the operationalization of open-source cyber threat intelligence more efficient.β17Updated this week
- Getting started with Decisions-Disruptionsβ11Jan 28, 2020Updated 6 years ago
- A Python script to crosspost Ghost articles to Medium. Written for Zapier.β11May 22, 2020Updated 5 years ago
- Tools for hunting security threatsβ12Feb 4, 2020Updated 6 years ago
- Feed of phish-domains found by Validin Threat Intelligince Platformβ36Updated this week
- 1-Click AI Models by DigitalOcean Gradient β’ AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Threat Simulator for Enterprise Networksβ14May 14, 2022Updated 3 years ago
- β20Jan 20, 2023Updated 3 years ago
- A script to assist in processing forensic RAM captures for malware triageβ26Feb 4, 2021Updated 5 years ago
- β21Mar 20, 2026Updated last week
- Chrome/Chromium Forensic Tool : Parses History, Visited Links, Downloaded Files and Cacheβ20Feb 4, 2024Updated 2 years ago
- Hakabana monitoring tool using Haka, ElastcSearch and Kibanaβ20Sep 24, 2014Updated 11 years ago
- A resource for leveraging Windows and Sysmon event codes in threat hunting and incident response.β26Sep 29, 2024Updated last year