spydisec / spydithreatintelLinks
A repository dedicated to sharing Indicators of Compromise (IOCs) from production systems experiencing security incidents and OSINT feeds.
☆39Updated this week
Alternatives and similar repositories for spydithreatintel
Users that are interested in spydithreatintel are comparing it to the libraries listed below
Sorting:
- Tor onion address lookup☆59Updated last month
- IOCs collected during day-to-day activities☆106Updated this week
- Scripts for importing threat feeds and CTI articles, blogs, and reports into MISP.☆18Updated 7 months ago
- 🔍 Discover if a domain is resolvable or blocked by secure DNS and Ad-blocking services, and experience the innovative idea of DaaS - DNS…☆82Updated 3 months ago
- ☆82Updated 4 months ago
- Sniffing out well-known threat groups☆64Updated last year
- Turn any blog into structured threat intelligence.☆51Updated last week
- Repo for experimenting and testing MCP server builds for CTI-related research.☆27Updated 8 months ago
- Raw data from Threat Intelligence Reports with automatic reports collection and keyword search across thousands of reports☆148Updated this week
- ☆56Updated last year
- Data breaches, Leaks, Malwares Forums List <Please Use Vpn/TOR don't click on Link directly bad OPSEC>☆58Updated 4 months ago
- Daily updates from leaked data search engines, aggregators and similar services.☆146Updated this week
- Automated threat intel feed parsing and consolidation💻👾🤖☆39Updated this week
- The Art of Pivoting - Techniques for Intelligence Analysts to Discover New Relationships in a Complex World☆155Updated last month
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆151Updated last year
- God Mode Detection Rules☆135Updated last year
- Have you ever wanted to search a link or IP address on multiple OSINT pages at once?☆59Updated 7 months ago
- ☆34Updated 3 months ago
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.☆53Updated last year
- This repository contains Malicious Indicator of Compromise (IOC) blocklist for MISP, firewall which is vital for cybersecurity profession…☆116Updated 4 months ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆69Updated 2 years ago
- C2 Active Scanner☆59Updated last year
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆63Updated last year
- Repository of tools and resources for analyzing Docker containers☆72Updated 2 years ago
- A comprehensive GenAI protection system designed to protect against malicious prompts, injection attacks, and harmful content. System inc…☆94Updated 3 months ago
- Knowledge base on cybercriminal concealment techniques☆95Updated this week
- APT hub, It help's research to collect information and data on the latest APT activities. It collects data on APT profiles, IOCs(1 yr), a…☆54Updated 11 months ago
- Cyber threat intelligence tool suite.☆42Updated 10 months ago
- TTPMapper is an AI-driven threat intelligence parser that converts unstructured reports whether from web URLs or PDF files into structure…☆49Updated 7 months ago
- Framework for Monitoring File Ingestion Source for Yara Matches☆50Updated 11 months ago