securityscorecard / SSC-Threat-Intel-IoCs
Public access for readers of our technical blogs posts and reports can access IoCs and other data
☆71Updated 9 months ago
Alternatives and similar repositories for SSC-Threat-Intel-IoCs:
Users that are interested in SSC-Threat-Intel-IoCs are comparing it to the libraries listed below
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆59Updated last year
- ☆45Updated 9 months ago
- This repository is for Indicators of Compromise (IOCs) from Zscaler ThreatLabz public reports☆66Updated 2 months ago
- Digital Forensics Incident Response and Detection engineering: Análisis forense de artefactos comunes y no tan comunes. Técnicas anti-for…☆75Updated 2 months ago
- ☆96Updated last month
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆59Updated 6 months ago
- Cyber Underground General Intelligence Requirements☆89Updated 11 months ago
- Building a consolidated RSS feed for articles about cyberattacks☆63Updated this week
- A really good DFIR automation for collecting and analyzing evidence designed for cybersecurity professionals.☆151Updated 8 months ago
- 🏴☠️💰 Another Ransomware gang tracker☆171Updated last week
- The Threat Actor Profile Guide for CTI Analysts☆102Updated last year
- Track C2 servers, tools, and botnets over time by framework and location☆36Updated last year
- ☆27Updated this week
- Newly registered Domain Monitoring to detect phishing and brand impersonation with subdomain enumeration and source code scraping☆47Updated this week
- Dictionary of CTI-related acronyms, terms, and jargon☆140Updated last year
- Tor onion address lookup☆34Updated 3 months ago
- Fast IOC and YARA Scanner☆75Updated 4 years ago
- Regular Expressions List used in Digital Forensic Tasks☆77Updated 11 months ago
- BlackBerry Threat Research & Intelligence☆96Updated last year
- Convert a variety of log formats to CSV while enriching detected IPs with Geolocation, ASN, DNS, WhoIs, Shodan InternetDB and Threat Indi…☆100Updated 3 months ago
- MISP Playbooks☆182Updated last month
- Forensic Artifact Collection Tool Matrix☆79Updated 2 months ago
- Just some lists of Malware Configs☆168Updated last week
- Purpleteam scripts simulation & Detection - trigger events for SOC detections☆169Updated last month
- With EmailAnalyzer you can analyze your suspicious emails. You can extract headers, links, and hashes from the .eml file and you can gene…☆243Updated last year
- WhatMail is a command-line tool that analyzes the header of an email and provides detailed information about various fields.☆130Updated last year
- Computes the hashes of a favicon file and provides the search syntax for Shodan, Censys and Zoomeye☆40Updated last year
- Cyber Threat Intelligence Data, Indicators, and Analysis☆80Updated last month
- Ransomware groups posts☆35Updated this week