Public access for readers of our technical blogs posts and reports can access IoCs and other data
☆75Apr 9, 2024Updated 2 years ago
Alternatives and similar repositories for SSC-Threat-Intel-IoCs
Users that are interested in SSC-Threat-Intel-IoCs are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆54Aug 19, 2025Updated 8 months ago
- IOCs for various malware families☆11Jul 18, 2024Updated last year
- Cyber Threats Detection Rules☆14Sep 16, 2025Updated 7 months ago
- Machine-readable .txt IP blocklist from ThreatFox by Abuse.ch, updated every hour.☆53Updated this week
- Indicators of compromise☆17Jan 29, 2026Updated 2 months ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Golang implementation of PyMISP-feedgenerator☆18Jul 31, 2022Updated 3 years ago
- Six Degrees of Domain Admin☆15Oct 23, 2017Updated 8 years ago
- USB HID driver emulation with PID/VID (0x3bca/0x27bb) of Plenom A/S Busylight Alpha, that is supported by Mimikatz. When mimikatz is exec…☆21Sep 6, 2022Updated 3 years ago
- Simplified version of a common crawl fetcher☆17Dec 24, 2025Updated 3 months ago
- Specifications used in the MISP project including MISP core format☆54Jan 7, 2026Updated 3 months ago
- The "Let's-defend-solution" directory contains the answers to all paths of the Let's Defend platform that were saved by the creator 8 mon…☆12Apr 27, 2023Updated 2 years ago
- Best practice configuration for Linux auditd for CIS and STIG standards, enhanced with LOTL detection rules.☆17Dec 6, 2025Updated 4 months ago
- Exports MISP events to STIX and ingest into McAfee ESM☆15Feb 12, 2020Updated 6 years ago
- This repo contains IOC, malware and malware analysis associated with Public cloud☆249Nov 11, 2024Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- 🛡️ The Ultimate Cybersecurity Library | 160+ curated books, guides & resources covering Ethical Hacking, Penetration Testing, Bug Bounty…☆59Mar 5, 2026Updated last month
- Windows Persistence Toolkit in C#☆36Sep 23, 2022Updated 3 years ago
- ☆10Jul 1, 2023Updated 2 years ago
- Signatures and IoCs from public Volexity blog posts.☆366Dec 4, 2025Updated 4 months ago
- MISP-STIX-Converter - Python library to handle the conversion between MISP and STIX formats☆57Updated this week
- Configurations to implement Wazuh☆13Nov 28, 2022Updated 3 years ago
- Repository to provide files related to our blog articles.☆16May 26, 2025Updated 10 months ago
- Practice CTI Quiz☆13Mar 20, 2024Updated 2 years ago
- TweetFeed collects Indicators of Compromise (IOCs) shared by the infosec community at Twitter. Here you will find malicious URLs, domains…☆650Updated this week
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Continuous build system used by Mono and Moonlight.☆34Apr 8, 2020Updated 6 years ago
- Native C++ access to Active Directory over ADWS, no .NET, no WCF, no HTTP stack.☆65Mar 27, 2026Updated 3 weeks ago
- ☆34Apr 8, 2026Updated last week
- IOC Data Obtained From Karakurt Hacking Team's Internal Infrastructure☆34Apr 22, 2022Updated 3 years ago
- Automate vulnerability triage which prioritizes remediation over discovery☆20Apr 12, 2026Updated last week
- S3 bucket enumerator☆30Apr 7, 2019Updated 7 years ago
- My Linux profiles built for Volatility 2/3☆11Oct 11, 2025Updated 6 months ago
- Building a consolidated RSS feed for articles about cyberattacks☆74Updated this week
- Crawler that retrieves commoncrawl's crawled hosts and their corresponding IPs☆21Sep 1, 2025Updated 7 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- This script enhances endpoint logging telemetry for the purpose of advanced malware threat detection or for building detections or malwar…☆41Apr 7, 2025Updated last year
- Rapid7 Labs operates as the division of Rapid7 focused on threat research. It is renowned for providing comprehensive threat intelligence…☆98Apr 7, 2026Updated last week
- Synapse Rapid Power-up for SinkDB☆11Jun 24, 2025Updated 9 months ago
- ☆15Dec 20, 2019Updated 6 years ago
- MISP sighting server is a fast sighting server to store and look-up sightings on attributes (network indicators, file hashes, system indi…☆15Dec 24, 2023Updated 2 years ago
- ☆12Dec 7, 2022Updated 3 years ago
- CyCAT.org taxonomies☆15May 22, 2021Updated 4 years ago