Raw data from Threat Intelligence Reports with automatic reports collection and keyword search across thousands of reports
☆162Apr 7, 2026Updated this week
Alternatives and similar repositories for ThreatIntel-Reports
Users that are interested in ThreatIntel-Reports are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Purpleteam scripts simulation & Detection - trigger events for SOC detections☆196Dec 20, 2024Updated last year
- yara detection rules for hunting with the threathunting-keywords project☆158May 11, 2025Updated 10 months ago
- Awesome list of keywords and artifacts for Threat Hunting sessions☆650Aug 4, 2025Updated 8 months ago
- Living of the Land of Free SaaS☆69Mar 22, 2026Updated 2 weeks ago
- lolC2 is a collection of C2 frameworks that leverage legitimate services to evade detection☆311Mar 22, 2026Updated 2 weeks ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Collect Windows telemetry for Maldev☆467Jan 30, 2026Updated 2 months ago
- Sigma detection rules for hunting with the threathunting-keywords project☆59Mar 2, 2025Updated last year
- Awesome Security lists for SOC/CERT/CTI☆1,315Updated this week
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆82Apr 27, 2024Updated last year
- Repository where I hold random detection and threat hunting queries that I come up with based on different sources of information (or eve…☆280Dec 20, 2025Updated 3 months ago
- BadExclusionsNWBO is an evolution from BadExclusions to identify folder custom or undocumented exclusions on AV/EDR☆76Feb 9, 2024Updated 2 years ago
- Kibana app for RedELK☆18Mar 19, 2023Updated 3 years ago
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆117Oct 29, 2024Updated last year
- Indicators of compromise☆17Jan 29, 2026Updated 2 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- rust port of pspy with support for process monitoring over dbus☆37Jan 4, 2026Updated 3 months ago
- Unix Process hollowing in rust☆22Dec 16, 2024Updated last year
- A COFF Loader written in Rust☆140Dec 1, 2025Updated 4 months ago
- A Pentesters Confluence Keyword Scanner☆17Dec 3, 2024Updated last year
- A repository to store community malware research notes and findings.☆15Feb 13, 2026Updated last month
- This is the Git repository for the Modern Red Teaming workshop given at SINCON2024.☆13May 23, 2024Updated last year
- A resource containing all the tools each ransomware gangs uses☆1,343Apr 1, 2026Updated last week
- A Large Action Model designed to operate on MacOS or Windows which interacts with common C2 interfaces such as Cobalt Strike, Havoc, or B…☆26Feb 29, 2024Updated 2 years ago
- ☆52Mar 30, 2026Updated last week
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆15May 3, 2024Updated last year
- Generic PE loader for fast prototyping evasion techniques☆245Jul 2, 2024Updated last year
- Abusing Azure services over C2☆368Jan 20, 2026Updated 2 months ago
- Convert Microsoft Defender Antivirus Signatures (VDM) into YARA rules☆185Updated this week
- Interesting APT Report Collection And Some Special IOCs☆2,959Updated this week
- A curated list of Awesome Threat Intelligence Blogs☆522Mar 23, 2026Updated 2 weeks ago
- Create malware knowledge graphs from analysis reports☆40Dec 6, 2023Updated 2 years ago
- a tiny program to consume from ETW providers for research☆55Jan 4, 2025Updated last year
- Living off the False Positive!☆42Apr 3, 2026Updated last week
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Abuse leaked token handles.☆136Dec 14, 2023Updated 2 years ago
- Shellcode loader that executes embedded Lua from Rust.☆124Dec 16, 2024Updated last year
- IOCs collected during day-to-day activities☆119Updated this week
- GPOAnalyzer is a tool designed to assist in parsing domain Group Policy Object (GPO) files located in the SYSVOL directory.☆28Jun 14, 2024Updated last year
- This repository contains Open Source freely usable Threat Intel feeds that can be used without additional requirements. Contains multiple…☆817Updated this week
- Deobfuscation of XorStringsNet☆14Nov 5, 2024Updated last year
- A collection of CVEs weaponized by ransomware operators☆129Oct 13, 2025Updated 5 months ago