securityscorecard / SSC-Threat-Intel-IoCs
Public access for readers of our technical blogs posts and reports can access IoCs and other data
☆72Updated last year
Alternatives and similar repositories for SSC-Threat-Intel-IoCs
Users that are interested in SSC-Threat-Intel-IoCs are comparing it to the libraries listed below
Sorting:
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆64Updated last year
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆61Updated 10 months ago
- ☆32Updated 3 weeks ago
- ☆48Updated this week
- Malicious IP source.☆93Updated this week
- The Threat Actor Profile Guide for CTI Analysts☆106Updated last year
- ☆96Updated last week
- Building a consolidated RSS feed for articles about cyberattacks☆67Updated this week
- Newly registered Domain Monitoring to detect phishing and brand impersonation with subdomain enumeration and source code scraping☆50Updated 3 months ago
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆88Updated 6 months ago
- 🏴☠️💰 Another Ransomware gang tracker☆197Updated this week
- Fast IOC and YARA Scanner☆79Updated 5 years ago
- Ransomware groups posts☆39Updated this week
- IOCs collected during day-to-day activities☆54Updated last week
- MISP Playbooks☆200Updated 3 months ago
- This repository is for Indicators of Compromise (IOCs) from Zscaler ThreatLabz public reports☆73Updated 5 months ago
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆122Updated last year
- Includes quick start guides for Shodan for both IT and ICS/OT assets☆127Updated last year
- This repository contains a comprehensive list of over 30k dynamic DNS domains as of 2024. The list is provided for informational purposes…☆95Updated 4 months ago
- A collection of companies that disclose adversary TTPs after they have been breached☆243Updated last year
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆51Updated 5 months ago
- Cyber Underground General Intelligence Requirements☆92Updated last year
- The Ransomware.live API Server is a Flask-based web application that provides endpoints to query and retrieve data related to ransomware …☆23Updated 6 months ago
- God Mode Detection Rules☆134Updated 9 months ago
- Convert a variety of log formats to CSV while enriching detected IPs with Geolocation, ASN, DNS, WhoIs, Shodan InternetDB and Threat Indi…☆103Updated 7 months ago
- Enhance your malware detection with WAF + YARA (WAFARAY)☆108Updated 2 years ago
- Dictionary of CTI-related acronyms, terms, and jargon☆142Updated last year
- Digital Forensics Incident Response and Detection engineering: Análisis forense de artefactos comunes y no tan comunes. Técnicas anti-for…☆78Updated last month
- BlackBerry Threat Research & Intelligence☆98Updated last year
- Pythia is a versatile query format designed to facilitate the discovery of malicious infrastructure by seamlessly converting into the syn…☆33Updated 9 months ago