proferosec / Threat-IntelligenceView external linksLinks
A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.
☆10Sep 17, 2019Updated 6 years ago
Alternatives and similar repositories for Threat-Intelligence
Users that are interested in Threat-Intelligence are comparing it to the libraries listed below
Sorting:
- Solutions for various crackmes☆20Jan 13, 2013Updated 13 years ago
- Community-based CybergON-powered Suricata rules☆12Jul 5, 2022Updated 3 years ago
- Malware samples observed in the wild from time to time☆12Jul 29, 2019Updated 6 years ago
- Take a list of URIs and print all the of the paths☆10Aug 16, 2020Updated 5 years ago
- ☆12Jan 28, 2020Updated 6 years ago
- Scan outlook inbox with yara rules,APIs and IOCs☆14Aug 3, 2018Updated 7 years ago
- ☆12Apr 23, 2020Updated 5 years ago
- Plugins for the Viper Framework☆14Sep 21, 2019Updated 6 years ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Apr 18, 2020Updated 5 years ago
- Mikrotik's Winbox in a docker container accessible via noVNC through a web browser.☆13May 12, 2025Updated 9 months ago
- Mass Suricata rules creator, from a list of domain☆14Sep 14, 2018Updated 7 years ago
- Suricata rules to detect Winnti communication☆16Mar 5, 2018Updated 7 years ago
- Malware vulnerability research. Coming soon..☆12Apr 20, 2020Updated 5 years ago
- An Ansible playbook for deploying the Suricata intrusion detection system and fetching Snort rules with Oinkmaster.☆17Oct 30, 2021Updated 4 years ago
- Remote Desktop Client Fingerprint script for Zeek. Based off of https://github.com/0x4D31/fatt☆40Jun 20, 2023Updated 2 years ago
- A Yara Lua output script for Suricata☆20Apr 7, 2019Updated 6 years ago
- Suricata LUA scripts to detect CVE-2019-12255, CVE-2019-12256, CVE-2019-12258, and CVE-2019-12260☆19Nov 28, 2019Updated 6 years ago
- Nano meterpreter shell based on TinyMet☆28Aug 27, 2016Updated 9 years ago
- useful mikrotik functions☆21Oct 8, 2025Updated 4 months ago
- Starting Code for my How to Write Malware 101 Class. This is a Proof of Concept of a C# RAT (Remote Access Trojan) made by Sean Pierce (@…☆22May 29, 2018Updated 7 years ago
- Code and Slides of my BSides London 2019 presentation about Attacker Emulation using CALDERA☆22Jun 9, 2019Updated 6 years ago
- Comprehensive Pivoting Framework☆20Sep 20, 2016Updated 9 years ago
- Use your Mikrotik firewall to do fail2ban like blocking of unwanted IPs. Written in Go☆27Jan 14, 2026Updated last month
- Decrypt NTDS hashes☆23Jan 22, 2014Updated 12 years ago
- Exploits made practicing for OSCE☆23Dec 3, 2020Updated 5 years ago
- Yara rules☆22Mar 27, 2023Updated 2 years ago
- Kibana 6 Templates for Suricata IDPS Threat Hunting☆24Mar 5, 2019Updated 6 years ago
- 100 Days of YARA to be updated with rules & ideas as the year progresses☆60Jan 18, 2023Updated 3 years ago
- Screenshot Shenanigans☆26Nov 20, 2017Updated 8 years ago
- A tool to help malware analysts signature unique parts of RTF documents☆29Jan 5, 2026Updated last month
- Duitku Payment gateway for PHPNuxBill☆13Aug 23, 2025Updated 5 months ago
- Quickly generate suricata rules for IOCs☆28Apr 30, 2021Updated 4 years ago
- A collection of Indicators of Compromise (IoCs), most aligning with samples derived from the signatures in the YARA-Signatures repo☆29Jun 11, 2020Updated 5 years ago
- Golang Bandwidth monitoring utility for Mikrotik RouterOS Devices☆27Mar 17, 2015Updated 10 years ago
- Templates for Kibana/Logstash to use with Suricata IDPS☆81Mar 12, 2016Updated 9 years ago
- Get Mikrotik's accounting data and push it to influxdb.☆30Oct 31, 2022Updated 3 years ago
- Ex-pv8's☆64Aug 28, 2019Updated 6 years ago
- DShield Sensor Log Collection with ELK☆44Feb 4, 2026Updated last week
- D4 core software (server and sample sensor client)☆42Dec 23, 2023Updated 2 years ago