Cyber Threat Intelligence Data, Indicators, and Analysis
☆109Jan 20, 2026Updated 2 months ago
Alternatives and similar repositories for cyber_threat_intelligence
Users that are interested in cyber_threat_intelligence are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆57Jan 16, 2023Updated 3 years ago
- Cyber Threat Intelligence - Toolbox☆52Oct 8, 2018Updated 7 years ago
- Public Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchers☆779Feb 8, 2026Updated last month
- Cyber Threat Intelligence Feeds☆98Sep 26, 2016Updated 9 years ago
- Cybercrime forums for Cyber Threat Intelligence purpose☆92Sep 25, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- TMTG(Twint Mention to Graph) is tools for converting twint user mentions data to network graph for use in Gephi or others network mapping…☆13Aug 5, 2021Updated 4 years ago
- Repository to track community hardware, data and funding.☆12Apr 8, 2022Updated 3 years ago
- Active C&C Detector☆156Oct 5, 2023Updated 2 years ago
- Decentralized Cyber Threat Intelligence Kaizen Framework☆27Jan 31, 2022Updated 4 years ago
- ☆14Oct 25, 2022Updated 3 years ago
- Threatelligence is a simple cyber threat intelligence feed collector, using Elasticsearch, Kibana and Python to automatically collect int…☆150Jun 3, 2014Updated 11 years ago
- Python3 script that can download samples directly from Abuse.CH or via submitted URLs☆15Apr 15, 2020Updated 5 years ago
- ☆20Apr 10, 2025Updated 11 months ago
- A commercial grade threat intelligence feed thats validated and updated every half hour.☆19Mar 24, 2023Updated 3 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- A collection of papers, blogs, and resources that make up the quintessential aspects of cyber threat intelligence☆710Apr 21, 2025Updated 11 months ago
- Web based analysis platform for use with the AWS_IR command line tool.☆17Aug 4, 2016Updated 9 years ago
- A homebrewed cyber threat intelligence solution☆20Nov 20, 2012Updated 13 years ago
- A collection of my yara rules☆34Jul 11, 2023Updated 2 years ago
- BlueBox Malware analysis Box and Cyber threat intelligence.☆47Apr 17, 2022Updated 3 years ago
- TRAM is an open-source platform designed to advance research into automating the mapping of cyber threat intelligence reports to MITRE AT…☆555May 6, 2025Updated 10 months ago
- Extract and aggregate threat intelligence.☆907Jan 31, 2024Updated 2 years ago
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆20Feb 13, 2026Updated last month
- Threat Intel Platform for T-POTs☆187Mar 21, 2026Updated last week
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A mirror image of my detection rules☆47Mar 19, 2026Updated last week
- Open KLara Project☆36Feb 12, 2026Updated last month
- Intelligence around common attacker behaviors (MITRE ATT&CK TTPs), in the form of ATT&CK Navigator "layer" json files.☆36Aug 12, 2022Updated 3 years ago
- Extract files from ADB devices on Windows, Linux and MacOS. Mostly a wrapper for adbutils.☆42Mar 10, 2026Updated 2 weeks ago
- This repository is for Indicators of Compromise (IOCs) from Zscaler ThreatLabz public reports☆78Jan 26, 2026Updated 2 months ago
- local trading of BNB and Meme Rush tokens on Binance Smart Chain☆28Mar 17, 2026Updated last week
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Apr 18, 2020Updated 5 years ago
- Public access for readers of our technical blogs posts and reports can access IoCs and other data☆75Apr 9, 2024Updated last year
- ATT&CK Powered Suit is a browser extension that puts the complete MITRE ATT&CK® knowledge base at your fingertips with text search, conte…☆82Mar 19, 2026Updated last week
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- CarbonBlack EDR detection rules and response actions☆73Sep 10, 2024Updated last year
- An Archive of Ransomware Notes Past and Present Collected by Zscaler ThreatLabz☆406Mar 17, 2026Updated last week
- Proof of Concept for Path Traversal in Apache Struts ("CVE-2023-50164")☆57Dec 18, 2023Updated 2 years ago
- a variety of tools,scripts and techniques developed and shared with different programming languages by 0xsp Lab☆64Dec 26, 2024Updated last year
- High-level Threat Intelligence playbooks☆20Mar 6, 2021Updated 5 years ago
- This library provides functionality for fetching and parsing information about Common Vulnerabilities and Exposures (CVE) using the NIST …☆14May 11, 2023Updated 2 years ago
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆283Mar 20, 2025Updated last year