spydisec / spydithreatintelLinks
A repository dedicated to sharing Indicators of Compromise (IOCs) from production systems experiencing security incidents and OSINT feeds.
☆39Updated this week
Alternatives and similar repositories for spydithreatintel
Users that are interested in spydithreatintel are comparing it to the libraries listed below
Sorting:
- This repository contains Malicious Indicator of Compromise (IOC) blocklist for MISP, firewall which is vital for cybersecurity profession…☆115Updated 4 months ago
- Scripts for importing threat feeds and CTI articles, blogs, and reports into MISP.☆18Updated 7 months ago
- Repo for experimenting and testing MCP server builds for CTI-related research.☆27Updated 8 months ago
- This repository contains a comprehensive list of over 30k dynamic DNS domains as of 2024. The list is provided for informational purposes…☆112Updated this week
- Turn any blog into structured threat intelligence.☆51Updated last week
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.☆53Updated last year
- yara detection rules for hunting with the threathunting-keywords project☆157Updated 8 months ago
- 🔍 Discover if a domain is resolvable or blocked by secure DNS and Ad-blocking services, and experience the innovative idea of DaaS - DNS…☆82Updated 3 months ago
- ☆34Updated 2 months ago
- Fast IOC and YARA Scanner☆88Updated 5 years ago
- Raw data from Threat Intelligence Reports with automatic reports collection and keyword search across thousands of reports☆148Updated this week
- Tor onion address lookup☆59Updated last month
- The Art of Pivoting - Techniques for Intelligence Analysts to Discover New Relationships in a Complex World☆150Updated last month
- IOCs collected during day-to-day activities☆104Updated last week
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆69Updated 2 years ago
- Sniffing out well-known threat groups☆64Updated last year
- Repository of tools and resources for analyzing Docker containers☆71Updated 2 years ago
- URL fingerprinting made easy☆90Updated last year
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆63Updated last year
- Helping Incident Responders hunt for potential persistence mechanisms on UNIX-based systems.☆17Updated 2 years ago
- God Mode Detection Rules☆135Updated last year
- A YARA & Malware Analysis Toolkit written in Rust.☆91Updated 3 months ago
- Rapid7 Labs operates as the division of Rapid7 focused on threat research. It is renowned for providing comprehensive threat intelligence…☆76Updated last month
- Indicators of Compromise (IOCs) accompanying HP Threat Research blog posts and reports.☆29Updated last year
- C2 Active Scanner☆59Updated last year
- Knowledge base on cybercriminal concealment techniques☆92Updated 8 months ago
- ☆56Updated last year
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆115Updated last year
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆151Updated last year
- Cyber Underground General Intelligence Requirements☆97Updated 2 years ago