Threat intelligence or Cyber Threat Intelligence is the process of identifying and analyzing gathered information about past, current, and future cyber threats (Collecting information about a potential threat, then analyzing that information to learn more about the negative events)
☆13Feb 18, 2024Updated 2 years ago
Alternatives and similar repositories for threat-intelligence
Users that are interested in threat-intelligence are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Cyber Kill Chain is a model that Lockheed Martin created for understanding (Describe the sequence of events) and stopping cyberattacks☆11Jan 29, 2024Updated 2 years ago
- Collection of exploits that were verified by an automated system☆13Jun 17, 2021Updated 4 years ago
- A collection of attacks metadata that were used in my previous pen-test tools☆17Dec 23, 2022Updated 3 years ago
- Recent cyber attacks reports & interesting analysis files☆15Apr 14, 2022Updated 3 years ago
- A sample web application using Node.js, Express and Angular that is vulnerable to common security vulnerabilities.☆10Jun 15, 2023Updated 2 years ago
- An adversary may utilize a sim swapping attack for defeating 2fa authentication☆25Jan 29, 2024Updated 2 years ago
- An adversary may utilize a sim swapping attack for defeating 2fa authentication☆24Jan 29, 2024Updated 2 years ago
- Agile Sandbox for analyzing Windows, Linux and macOS malware and execution behaviors☆74Nov 12, 2023Updated 2 years ago
- A curated list of awesome v0 generations☆16Dec 16, 2023Updated 2 years ago
- A nix flake to setup a Tauri development environment. Only tested on (x86_64-unknow-linux-gnu, NixOS). Looking for Darwin contribution an…☆16Mar 6, 2024Updated 2 years ago
- [Cocos Creator 编辑器扩展] 用于快速预览骨骼动画。提供独立窗口,也可以附着在编辑器中;可以在编辑器内直接选中资源来预览,也支持打开外部的资源...☆10Apr 8, 2022Updated 3 years ago
- ☆12Mar 9, 2024Updated 2 years ago
- Interface for Image-Related Deep Learning Models (E.g. NSFW, MAYBE and SFW)☆34Apr 15, 2022Updated 3 years ago
- NLP Toolkit for Low-resource Pashto Language☆14Feb 1, 2025Updated last year
- Generate database files and script files from CSV. Staff members only need to operate Excel as usual without clicking any button.☆11Oct 17, 2024Updated last year
- Analyze, extract and visualize features, artifacts and IoCs of files and memory dumps (Windows, Linux, Android, iPhone, Blackberry, macOS…☆312Apr 15, 2024Updated last year
- ELKFH - Elastic, Logstash, Kibana, Filebeat and Honeypot (HTTP, HTTPS, SSH, RDP, VNC, Redis, MySQL, MONGO, SMB, LDAP)☆48Apr 26, 2021Updated 4 years ago
- ☆18Apr 30, 2025Updated 10 months ago
- Two plugins to recover TMP keys from Saleae logic analyser traces☆15Jun 10, 2022Updated 3 years ago
- a-ray-grass is a yara module that provides support for DCSO-format bloom filters in yara. In the context of hashlookup, it allows quickly…☆14Aug 19, 2022Updated 3 years ago
- Video API for Originating Pirated Content☆29May 22, 2023Updated 2 years ago
- A series of functions to parse Teamviewer logs to answer specific questions☆10Jul 17, 2022Updated 3 years ago
- Bug Bounty Recon wordlist Generator☆21Jul 17, 2020Updated 5 years ago
- Chrome Web Store☆19Jul 11, 2024Updated last year
- Python Flood Attack Tool You can easily launch Flood Attack with this tool☆12Jul 13, 2022Updated 3 years ago
- Pashto Natural Language Processing Toolkit☆10May 21, 2025Updated 10 months ago
- Python framework for TradingView's Lightweight Charts JavaScript library.☆20Aug 16, 2025Updated 7 months ago
- Ransomware dataset, containing dynamic behaviour of more than 60 distinct ransomware families.☆10Aug 29, 2022Updated 3 years ago
- Mobile-Bench: An Evaluation Benchmark for LLM-based Mobile Agents☆27Dec 6, 2024Updated last year
- UiFry landing page built with Nextjs, Shadcn, and Tailwind.☆14Aug 25, 2024Updated last year
- A Minimised REST service framework coded in WASM (RUST) and the full service runs in the ZKWASM☆18Dec 24, 2025Updated 3 months ago
- Placeholder for my detection repo and misc detection engineering content☆42Oct 20, 2023Updated 2 years ago
- Documentation for Zero☆25Updated this week
- The Simx Simulator provides users with the ability to test AV and AMR algorithms in one of several pre-made Simx Simulator levels. The Op…☆20Nov 24, 2025Updated 4 months ago
- Custom security distro for remote penetration testing☆56Mar 26, 2021Updated 4 years ago
- ☆17Oct 16, 2019Updated 6 years ago
- Template to detect some malware☆14Aug 7, 2023Updated 2 years ago
- ☆17Mar 6, 2023Updated 3 years ago
- Colection of different JUMPSEC advisories, guidance, and scripts for all of the latest vulnerabilities and adversaries☆13Oct 18, 2021Updated 4 years ago