securityscorecard / SSC-Threat-Intel-IoCs
Public access for readers of our technical blogs posts and reports can access IoCs and other data
☆72Updated last year
Alternatives and similar repositories for SSC-Threat-Intel-IoCs:
Users that are interested in SSC-Threat-Intel-IoCs are comparing it to the libraries listed below
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆64Updated last year
- ☆47Updated last week
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆61Updated 9 months ago
- Building a consolidated RSS feed for articles about cyberattacks☆67Updated this week
- Newly registered Domain Monitoring to detect phishing and brand impersonation with subdomain enumeration and source code scraping☆49Updated 3 months ago
- The Threat Actor Profile Guide for CTI Analysts☆106Updated last year
- 🏴☠️💰 Another Ransomware gang tracker☆192Updated 2 weeks ago
- Tor onion address lookup☆38Updated 2 months ago
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆87Updated 5 months ago
- Track C2 servers, tools, and botnets over time by framework and location☆37Updated 2 months ago
- Convert a variety of log formats to CSV while enriching detected IPs with Geolocation, ASN, DNS, WhoIs, Shodan InternetDB and Threat Indi…☆103Updated 6 months ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆122Updated last year
- Computes the hashes of a favicon file and provides the search syntax for Shodan, Censys and Zoomeye☆44Updated last year
- A collection of companies that disclose adversary TTPs after they have been breached☆244Updated last year
- ☆74Updated 3 weeks ago
- Digital Forensics Incident Response and Detection engineering: Análisis forense de artefactos comunes y no tan comunes. Técnicas anti-for…☆77Updated last week
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆51Updated 4 months ago
- Import CrowdStrike Threat Intelligence into your instance of MISP☆46Updated last month
- Ransomware groups posts☆39Updated this week
- WhatMail is a command-line tool that analyzes the header of an email and provides detailed information about various fields.☆133Updated last year
- AIL project training materials☆29Updated 2 months ago
- Signature based honeypot detector tool written in Golang☆89Updated last month
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.☆51Updated 6 months ago
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆118Updated last year
- HookPhish is a Python script designed to aid in the detection of phishing websites☆35Updated last year
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆26Updated this week
- Regular Expressions List used in Digital Forensic Tasks☆83Updated 2 months ago
- An offline Phishing Email Analyzer. Enabling non-techies to analyze phishing emails automatically!☆61Updated last year
- Purpleteam scripts simulation & Detection - trigger events for SOC detections☆184Updated 4 months ago
- The Ransomware.live API Server is a Flask-based web application that provides endpoints to query and retrieve data related to ransomware …☆21Updated 5 months ago