Aggregated Indicators of Compromise collected and cross-verified from multiple open and community-supported sources, enriched and ranked using our intelligence platform for you. Threat Intelligence, Threat feed, Open source feed.
☆36Aug 19, 2024Updated last year
Alternatives and similar repositories for rstthreats
Users that are interested in rstthreats are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A free data collection and YARA scanning tool for cybersecurity incident investigation, compromise assessment and threat hunting☆21Nov 12, 2024Updated last year
- Enterprise Response Model & Common Knowledge☆38Jul 3, 2025Updated 9 months ago
- A commercial grade threat intelligence feed thats validated and updated every half hour.☆19Mar 24, 2023Updated 3 years ago
- Malware detonation platform Polygon integration☆10Aug 1, 2023Updated 2 years ago
- реп полезностей для PT MaxPatrol SIEM☆24Sep 18, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A real-time Grafana dashboard using MISP ZeroMQ message queue and InfluxDB☆19Mar 15, 2024Updated 2 years ago
- A mapping of used malware names to commonly known family names☆63Feb 21, 2023Updated 3 years ago
- Assist analyst and threat hunters to understand Windows authentication logs and to analyze brutforce scenarios.☆21Jul 1, 2023Updated 2 years ago
- Manage attack surface data on Elasticsearch☆25Nov 20, 2023Updated 2 years ago
- pyJARM is a library for doing JARM fingerprinting using python☆50Mar 23, 2025Updated last year
- Malicious URLs and IP Addresses compiled by USOM (Computer Emergency Response Team of Turkey), updated once a day.☆22Updated this week
- Js File Scanner☆11Mar 30, 2021Updated 5 years ago
- Tool for obtaining information about PPL processes☆16Feb 12, 2024Updated 2 years ago
- Monitor collections of malicious Telegram bots used for phishing credential theft, to prevent frauds/dataleaks.☆16Jan 29, 2025Updated last year
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- ☆13Nov 24, 2021Updated 4 years ago
- Security checks for your researches☆34Nov 22, 2020Updated 5 years ago
- An open-source knowledge base for security researchers.☆18Jan 8, 2025Updated last year
- ☆24Updated this week
- Automatically created C2 Feeds☆670Updated this week
- Cobalt Strike/C2 Servers☆13Apr 22, 2021Updated 4 years ago
- String-based secret-searching tool (high entropy and regexes) based on truffleHog☆17Oct 21, 2021Updated 4 years ago
- Malware, advert and tracking blacklist☆120Nov 18, 2025Updated 5 months ago
- Targeting a signal handler race condition in OpenSSH's server (sshd) on glibc-based Linux systems.☆19Jul 3, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆15Feb 22, 2021Updated 5 years ago
- Exploit ConnectWise ScreenConnect (bypass authentication)☆13Feb 21, 2024Updated 2 years ago
- Google maps wifi geolocation using python☆13May 14, 2015Updated 10 years ago
- MP SIEM SDK☆30Dec 15, 2025Updated 4 months ago
- Divulge Stealer a highly advanced info-stealer that outperforms its predecessor, Umbral-Stealer by Blank-c. This new iteration is a compl…☆18Jan 7, 2025Updated last year
- ☆14Oct 14, 2022Updated 3 years ago
- Fang and defang indicators of compromise. You can test this project in a GUI here: http://ioc-fanger.hightower.space .☆68Oct 2, 2023Updated 2 years ago
- A repository with data about APTs☆13Nov 24, 2022Updated 3 years ago
- An Outlook Plugin to report phishing emails easier and provides full integration with GoPhish.☆52Feb 7, 2024Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Cyber threat intelligence tool suite.☆41Apr 3, 2025Updated last year
- BlackBerry Threat Research & Intelligence☆97Oct 20, 2023Updated 2 years ago
- A blocklist for Pihole from PhishTank☆29Jun 17, 2023Updated 2 years ago
- ForgeArmory provides TTPs that can be used with the TTPForge (https://github.com/facebookincubator/ttpforge).☆123Mar 18, 2026Updated last month
- a-ray-grass is a yara module that provides support for DCSO-format bloom filters in yara. In the context of hashlookup, it allows quickly…☆14Aug 19, 2022Updated 3 years ago
- A series of functions to parse Teamviewer logs to answer specific questions☆10Jul 17, 2022Updated 3 years ago
- Intelligent threat hunter and phishing servers☆47Jan 20, 2019Updated 7 years ago