☆129Jan 29, 2024Updated 2 years ago
Alternatives and similar repositories for tweets
Users that are interested in tweets are comparing it to the libraries listed below
Sorting:
- Indicators of Compromise (IOCs) accompanying HP Threat Research blog posts and reports.☆29Apr 10, 2024Updated last year
- Indicators from Unit 42 Public Reports☆728Aug 17, 2025Updated 6 months ago
- ☆512Oct 7, 2024Updated last year
- This repository contains zip archives of pcaps for our Wireshark tutorial about examining Emotet infection traffic. The password for any …☆25Jan 11, 2021Updated 5 years ago
- Hundred Days of Yara Challenge☆12Jun 21, 2022Updated 3 years ago
- a-ray-grass is a yara module that provides support for DCSO-format bloom filters in yara. In the context of hashlookup, it allows quickly…☆14Aug 19, 2022Updated 3 years ago
- A YARA rules repository continuously updated for monitoring the old and new threats from articles, incidents responses ...☆141Nov 19, 2023Updated 2 years ago
- IOC from articles, tweets for archives☆318Dec 12, 2023Updated 2 years ago
- ☆194Feb 6, 2024Updated 2 years ago
- pcaps for Wireshark tutorial about examining Dridex infection traffic☆17Oct 8, 2020Updated 5 years ago
- ☆96May 5, 2025Updated 9 months ago
- ☆44Jul 11, 2025Updated 7 months ago
- Sophos-originated indicators-of-compromise from published reports☆653Jan 16, 2026Updated last month
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Feb 6, 2024Updated 2 years ago
- Repository of YARA rules made by Trellix ATR Team☆625Mar 18, 2025Updated 11 months ago
- Automatically created C2 Feeds☆666Updated this week
- A collection of intelligence about Log4Shell and its exploitation activity.☆184Mar 4, 2022Updated 4 years ago
- Simple and old virtual machine☆17Apr 28, 2016Updated 9 years ago
- Sigma rules from Joe Security☆232Nov 4, 2024Updated last year
- IOC Collection 2022☆57Mar 7, 2023Updated 2 years ago
- ☆24Mar 12, 2025Updated 11 months ago
- ☆18Dec 6, 2022Updated 3 years ago
- Rapid7 Labs operates as the division of Rapid7 focused on threat research. It is renowned for providing comprehensive threat intelligence…☆77Dec 15, 2025Updated 2 months ago
- Signatures and IoCs from public Volexity blog posts.☆364Dec 4, 2025Updated 3 months ago
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆154Apr 25, 2022Updated 3 years ago
- OSSEM Detection Model☆183Oct 11, 2022Updated 3 years ago
- Documentation and parsers for different anti-virus quarantine formats.☆42Dec 9, 2020Updated 5 years ago
- python3 scripts to help with aws triage needs☆15Feb 11, 2022Updated 4 years ago
- Collects a listing of MITRE ATT&CK Techniques, then discovers Splunk ESCU detections for each technique☆69Mar 17, 2024Updated last year
- ☆66Jan 27, 2023Updated 3 years ago
- ☆15Apr 8, 2023Updated 2 years ago
- #ThreatHunting #DFIR #Malware #Detection Mind Maps☆304Nov 13, 2021Updated 4 years ago
- ☆215Jun 5, 2025Updated 9 months ago
- Scripts I made to aid me in everyday reversing or just for fun...☆35Mar 25, 2019Updated 6 years ago
- Pythonic way to work with the warning lists defined there: https://github.com/MISP/misp-warninglists☆35Jan 8, 2026Updated last month
- ReversingLabs YARA Rules☆898Nov 3, 2025Updated 4 months ago
- Get intelligence info (tags, mitre techniques, yara and more) and find similar malware in a fast and easy way☆19Jun 6, 2022Updated 3 years ago
- Threat Intel IoCs + bits and pieces of dark matter☆434Feb 19, 2026Updated last week
- Scripts and tools accompanying HP Threat Research blog posts and reports.☆50Apr 10, 2024Updated last year