rodanmaharjan / ThreatIntelligenceLinks
This repository contains Malicious Indicator of Compromise (IOC) blocklist for MISP, firewall which is vital for cybersecurity professionals to enhance threat detection and improve incident response capabilities.
β115Updated last month
Alternatives and similar repositories for ThreatIntelligence
Users that are interested in ThreatIntelligence are comparing it to the libraries listed below
Sorting:
- β52Updated 2 months ago
- π΄ββ οΈπ° Another Ransomware gang trackerβ263Updated last month
- Welcome to the SEKOIA.IO Community repository!β164Updated 3 months ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.β68Updated last year
- Indicators of Compromiseβ227Updated last week
- IOCs collected during day-to-day activitiesβ80Updated this week
- Purpleteam scripts simulation & Detection - trigger events for SOC detectionsβ189Updated 10 months ago
- The Threat Actor Profile Guide for CTI Analystsβ115Updated 2 years ago
- Track C2 servers, tools, and botnets over time by framework and locationβ43Updated 8 months ago
- This repository contains a comprehensive list of over 30k dynamic DNS domains as of 2024. The list is provided for informational purposesβ¦β107Updated this week
- Repository of Yara rules dedicated to Phishing Kits Zip filesβ232Updated last week
- Just some lists of Malware Configsβ172Updated 9 months ago
- MISP Playbooksβ215Updated 2 weeks ago
- β34Updated this week
- yara detection rules for hunting with the threathunting-keywords projectβ151Updated 5 months ago
- Building a consolidated RSS feed for articles about cyberattacksβ72Updated this week
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defenseβ101Updated last year
- β96Updated last week
- IOK (Indicator Of Kit) is an open source language and ruleset for detecting phishing threat actor tools and tacticsβ188Updated 6 months ago
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitionersβ112Updated last year
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.β159Updated 6 months ago
- Cyber Threat Intelligence Data, Indicators, and Analysisβ98Updated 3 weeks ago
- With EmailAnalyzer you can analyze your suspicious emails. You can extract headers, links, and hashes from the .eml file and you can geneβ¦β277Updated 2 years ago
- Windows Forensics Environment Builderβ162Updated last month
- A collection of files with indicators supporting social media posts from Palo Alto Network's Unit 42 team to disseminate timely threat inβ¦β384Updated this week
- β195Updated last year
- Standard-Format Threat Intelligence Feedsβ124Updated this week
- Yet another Ransomware gang trackerβ506Updated this week
- Digital forensic analysis tool that provides a user-friendly interface for investigating disk images.β190Updated this week
- Import CrowdStrike Threat Intelligence into your instance of MISPβ48Updated 4 months ago