spydisec / spydithreatintelLinks
A repository dedicated to sharing Indicators of Compromise (IOCs) from production systems experiencing security incidents and OSINT feeds.
☆36Updated last week
Alternatives and similar repositories for spydithreatintel
Users that are interested in spydithreatintel are comparing it to the libraries listed below
Sorting:
- 🔍 Discover if a domain is resolvable or blocked by secure DNS and Ad-blocking services, and experience the innovative idea of DaaS - DNS…☆80Updated last month
- Data breaches, Leaks, Malwares Forums List <Please Use Vpn/TOR don't click on Link directly bad OPSEC>☆58Updated 2 months ago
- ☆56Updated 10 months ago
- Raw data from Threat Intelligence Reports with automatic reports collection and keyword search across thousands of reports☆140Updated last week
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆68Updated last year
- Scripts for importing threat feeds and CTI articles, blogs, and reports into MISP.☆18Updated 5 months ago
- Tor onion address lookup☆57Updated 3 months ago
- ☆52Updated 3 months ago
- IOCs from Google Threat Intelligence Group☆56Updated last month
- Cyber threat intelligence tool suite.☆42Updated 8 months ago
- This repository contains Malicious Indicator of Compromise (IOC) blocklist for MISP, firewall which is vital for cybersecurity profession…☆116Updated 2 months ago
- Sniffing out well-known threat groups☆64Updated last year
- Collection of videos of Raids on Cybercriminals☆21Updated 8 months ago
- ☆73Updated 2 months ago
- SECurityTr8Ker monitors the SEC's RSS feed for 8-K filings with cybersecurity incident disclosures.☆90Updated 5 months ago
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆150Updated last year
- TTPMapper is an AI-driven threat intelligence parser that converts unstructured reports whether from web URLs or PDF files into structure…☆46Updated 5 months ago
- This repository contains a comprehensive list of over 30k dynamic DNS domains as of 2024. The list is provided for informational purposes…☆110Updated this week
- ☆34Updated 3 weeks ago
- Framework for Monitoring File Ingestion Source for Yara Matches☆50Updated 8 months ago
- Threat feeds designed to extract adversarial TTPs and IOCs, using: ✨AI✨☆38Updated this week
- IOCs collected during day-to-day activities☆82Updated last week
- Turn any blog into structured threat intelligence.☆40Updated this week
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.☆52Updated last year
- A comprehensive GenAI protection system designed to protect against malicious prompts, injection attacks, and harmful content. System inc…☆95Updated last month
- A tool for mapping cyber crime☆222Updated 7 months ago
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆34Updated 5 months ago
- AI-powered cybersecurity attack flow visualization tool using MITRE ATT&CK☆185Updated last week
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆125Updated last year
- Capture screenshots of onion services on an onion service.☆72Updated last year