securityscorecard / SSC-Threat-Intel-IoCsLinks
Public access for readers of our technical blogs posts and reports can access IoCs and other data
☆72Updated last year
Alternatives and similar repositories for SSC-Threat-Intel-IoCs
Users that are interested in SSC-Threat-Intel-IoCs are comparing it to the libraries listed below
Sorting:
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆64Updated last year
- Newly registered Domain Monitoring to detect phishing and brand impersonation with subdomain enumeration and source code scraping☆51Updated 4 months ago
- 🏴☠️💰 Another Ransomware gang tracker☆203Updated last week
- Malicious IP source.☆97Updated this week
- ☆48Updated 3 weeks ago
- Regular Expressions List used in Digital Forensic Tasks☆86Updated 3 months ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆124Updated last year
- Digital Forensics Incident Response and Detection engineering: Análisis forense de artefactos comunes y no tan comunes. Técnicas anti-for…☆80Updated last month
- Track C2 servers, tools, and botnets over time by framework and location☆39Updated 3 months ago
- Convert a variety of log formats to CSV while enriching detected IPs with Geolocation, ASN, DNS, WhoIs, Shodan InternetDB and Threat Indi…☆105Updated 7 months ago
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆195Updated 4 months ago
- A collection of companies that disclose adversary TTPs after they have been breached☆243Updated last year
- The Ransomware.live API Server is a Flask-based web application that provides endpoints to query and retrieve data related to ransomware …☆23Updated 7 months ago
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆91Updated 7 months ago
- Pythia is a versatile query format designed to facilitate the discovery of malicious infrastructure by seamlessly converting into the syn…☆33Updated 10 months ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆61Updated 10 months ago
- Building a consolidated RSS feed for articles about cyberattacks☆67Updated this week
- ☆81Updated 2 weeks ago
- ☆32Updated this week
- The Threat Actor Profile Guide for CTI Analysts☆107Updated last year
- Finding ClickFix and FakeCAPTCHA like it's 1999☆38Updated this week
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆155Updated 2 months ago
- Computes the hashes of a favicon file and provides the search syntax for Shodan, Censys and Zoomeye☆45Updated last year
- IOCs collected during day-to-day activities☆56Updated this week
- Fast IOC and YARA Scanner☆79Updated 5 years ago
- A collection of CVEs weaponized by ransomware operators☆115Updated last week
- A repository of credential stealer formats☆217Updated 2 months ago
- Tor onion address lookup☆40Updated 4 months ago
- Ransomware groups posts☆39Updated this week
- Just some lists of Malware Configs☆170Updated 4 months ago