IntelOwl: manage your Threat Intelligence at scale
☆4,467Updated this week
Alternatives and similar repositories for IntelOwl
Users that are interested in IntelOwl are comparing it to the libraries listed below
Sorting:
- Your Everyday Threat Intelligence☆1,951Feb 12, 2026Updated 2 weeks ago
- Open Cyber Threat Intelligence Platform☆8,893Updated this week
- Malwoverview is a rapid response tool used to gather intelligence information from VirusTotal, Hybrid Analysis, URLHaus, Polyswarm, Malsh…☆3,548Jan 20, 2026Updated last month
- MISP (core software) - Open Source Threat Intelligence and Sharing Platform☆6,141Updated this week
- Automated Adversary Emulation Platform☆6,761Feb 17, 2026Updated last week
- The FLARE team's open-source tool to identify capabilities in executable files.☆5,844Updated this week
- Main Sigma Rule Repository☆10,145Feb 19, 2026Updated last week
- SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.☆16,768Dec 15, 2024Updated last year
- Digging Deeper....☆3,771Feb 21, 2026Updated last week
- TheHive is a Collaborative Case Management Platform, now distributed as a commercial version☆3,890Jul 25, 2025Updated 7 months ago
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,486Jan 12, 2026Updated last month
- A curated list of Awesome Threat Intelligence resources☆9,814Jan 19, 2026Updated last month
- Domain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonation☆5,600Apr 15, 2025Updated 10 months ago
- Extract and aggregate threat intelligence.☆906Jan 31, 2024Updated 2 years ago
- Automate the creation of a lab environment complete with security tooling and logging best practices☆4,906Jul 6, 2024Updated last year
- A query aggregator for OSINT based threat hunting☆930Jan 23, 2026Updated last month
- Detect Tactics, Techniques & Combat Threats☆2,263Jan 21, 2026Updated last month
- Watcher - Open Source AI-powered Cyber Threat Intelligence & Hunting Platform. Developed with Django & React JS.☆1,243Feb 18, 2026Updated last week
- Small and highly portable detection tests based on MITRE's ATT&CK.☆11,617Updated this week
- Rapidly Search and Hunt through Windows Forensic Artefacts☆3,452Feb 14, 2026Updated 2 weeks ago
- Windows Events Attack Samples☆2,515Jan 24, 2023Updated 3 years ago
- ✨ A curated list of awesome threat detection and hunting resources 🕵️♂️☆4,512Jan 5, 2026Updated last month
- A curated list of tools for incident response☆8,832Jul 18, 2024Updated last year
- Malware Configuration And Payload Extraction☆3,031Updated this week
- A curated list of awesome YARA rules, tools, and people.☆4,146Updated this week
- Shuffle: A general purpose security automation platform. Our focus is on collaboration and resource sharing.☆2,199Updated this week
- Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.☆3,037Updated this week
- The SOC Analysts all-in-one CLI tool to automate and speed up workflow.☆1,457Sep 25, 2024Updated last year
- Loki - Simple IOC and YARA Scanner☆3,726Jan 12, 2026Updated last month
- reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via E…☆8,479Nov 16, 2025Updated 3 months ago
- Network Analysis Tool☆3,333Apr 10, 2023Updated 2 years ago
- Red Team's SIEM - tool for Red Teams used for tracking and alarming about Blue Team activities as well as better usability in long term o…☆2,624Dec 13, 2025Updated 2 months ago
- Network recon framework. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run yo…☆3,953Feb 20, 2026Updated last week
- The Hunting ELK☆3,913Jun 1, 2024Updated last year
- An Active Defense and EDR software to empower Blue Teams☆1,316Aug 10, 2023Updated 2 years ago
- A Modern Orchestration Engine for Security☆6,109Feb 19, 2026Updated last week
- A toolset to make a system look as if it was the victim of an APT attack☆2,715Sep 23, 2025Updated 5 months ago
- DRAKVUF Sandbox - automated hypervisor-level malware analysis system☆1,266Feb 20, 2026Updated last week
- In-depth attack surface mapping and asset discovery☆14,159Updated this week