rodanmaharjan / ThreatIntelligenceLinks
This repository contains Malicious Indicator of Compromise (IOC) blocklist for MISP, firewall which is vital for cybersecurity professionals to enhance threat detection and improve incident response capabilities.
β115Updated 2 months ago
Alternatives and similar repositories for ThreatIntelligence
Users that are interested in ThreatIntelligence are comparing it to the libraries listed below
Sorting:
- π΄ββ οΈπ° Another Ransomware gang trackerβ267Updated 2 months ago
- Welcome to the SEKOIA.IO Community repository!β167Updated 2 weeks ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.β68Updated last year
- Indicators of Compromiseβ233Updated last week
- IOCs collected during day-to-day activitiesβ82Updated this week
- β52Updated 3 months ago
- Purpleteam scripts simulation & Detection - trigger events for SOC detectionsβ189Updated 11 months ago
- β34Updated last week
- The Threat Actor Profile Guide for CTI Analystsβ115Updated 2 years ago
- yara detection rules for hunting with the threathunting-keywords projectβ153Updated 6 months ago
- Yet another Ransomware gang trackerβ537Updated last week
- MISP Playbooksβ219Updated last month
- Cyber Threat Intelligence Data, Indicators, and Analysisβ101Updated last month
- β195Updated last year
- Repository of Yara rules dedicated to Phishing Kits Zip filesβ233Updated last month
- A collection of CVEs weaponized by ransomware operatorsβ125Updated last month
- ThreatSeeker: Threat Hunting via Windows Event Logsβ122Updated 2 years ago
- Just some lists of Malware Configsβ173Updated 10 months ago
- Building a consolidated RSS feed for articles about cyberattacksβ72Updated this week
- Track C2 servers, tools, and botnets over time by framework and locationβ43Updated 9 months ago
- IOK (Indicator Of Kit) is an open source language and ruleset for detecting phishing threat actor tools and tacticsβ190Updated 6 months ago
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitionersβ114Updated last year
- This repository contains a comprehensive list of over 30k dynamic DNS domains as of 2024. The list is provided for informational purposesβ¦β109Updated this week
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.β159Updated 7 months ago
- Raw data from Threat Intelligence Reports with automatic reports collection and keyword search across thousands of reportsβ139Updated last week
- Repository for sharing examples of our artifacts data and for use in new analyst recruitment.β108Updated 7 months ago
- Live Feed of C2 servers, tools, and botnetsβ726Updated last week
- β147Updated last month
- Awesome list of keywords and artifacts for Threat Hunting sessionsβ616Updated 3 months ago
- CLI tools for forensic investigation of Windows artifactsβ347Updated 4 months ago