Cyber Threat Intelligence Data, Indicators, and Analysis
☆110Jan 20, 2026Updated 3 months ago
Alternatives and similar repositories for cyber_threat_intelligence
Users that are interested in cyber_threat_intelligence are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Cyber Threat Intelligence Appliance☆13Dec 8, 2022Updated 3 years ago
- Cyber Threat Intelligence - Toolbox☆52Oct 8, 2018Updated 7 years ago
- Public Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchers☆785Feb 8, 2026Updated 2 months ago
- Cyber Threat Intelligence Feeds☆98Sep 26, 2016Updated 9 years ago
- Command and Control Framework☆13Mar 23, 2024Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Cybercrime forums for Cyber Threat Intelligence purpose☆93Sep 25, 2019Updated 6 years ago
- TMTG(Twint Mention to Graph) is tools for converting twint user mentions data to network graph for use in Gephi or others network mapping…☆13Aug 5, 2021Updated 4 years ago
- Can you pay the ransom in your country?☆14Dec 18, 2023Updated 2 years ago
- Decentralized Cyber Threat Intelligence Kaizen Framework☆27Jan 31, 2022Updated 4 years ago
- ☆14Oct 25, 2022Updated 3 years ago
- Threatelligence is a simple cyber threat intelligence feed collector, using Elasticsearch, Kibana and Python to automatically collect int…☆150Jun 3, 2014Updated 11 years ago
- Python3 script that can download samples directly from Abuse.CH or via submitted URLs☆15Apr 15, 2020Updated 6 years ago
- ☆20Apr 10, 2025Updated last year
- A collection of papers, blogs, and resources that make up the quintessential aspects of cyber threat intelligence☆715Apr 21, 2025Updated 11 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A homebrewed cyber threat intelligence solution☆20Nov 20, 2012Updated 13 years ago
- A collection of my yara rules☆34Jul 11, 2023Updated 2 years ago
- BlueBox Malware analysis Box and Cyber threat intelligence.☆47Apr 17, 2022Updated 4 years ago
- Creating a Feed of MISP Events from ThreatFox (by abuse.ch)☆19Jun 2, 2021Updated 4 years ago
- A platform independent C++ code obfuscator.☆13Jul 20, 2019Updated 6 years ago
- Extract and aggregate threat intelligence.☆909Jan 31, 2024Updated 2 years ago
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆20Feb 13, 2026Updated 2 months ago
- Open KLara Project☆35Feb 12, 2026Updated 2 months ago
- Intelligence around common attacker behaviors (MITRE ATT&CK TTPs), in the form of ATT&CK Navigator "layer" json files.☆36Aug 12, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- IOCs published by Black Lotus Labs☆140Apr 8, 2026Updated last week
- This repository is for Indicators of Compromise (IOCs) from Zscaler ThreatLabz public reports☆79Jan 26, 2026Updated 2 months ago
- local trading of BNB and Meme Rush tokens on Binance Smart Chain☆28Mar 17, 2026Updated last month
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆13Apr 18, 2020Updated 6 years ago
- Public access for readers of our technical blogs posts and reports can access IoCs and other data☆75Apr 9, 2024Updated 2 years ago
- Burp extension used to snip any header from all the requests.☆23Nov 12, 2023Updated 2 years ago
- CarbonBlack EDR detection rules and response actions☆73Sep 10, 2024Updated last year
- information about ransomware groups (Ransomware Analysis Notes)☆41Dec 26, 2023Updated 2 years ago
- An Archive of Ransomware Notes Past and Present Collected by Zscaler ThreatLabz☆413Apr 6, 2026Updated 2 weeks ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Proof of Concept for Path Traversal in Apache Struts ("CVE-2023-50164")☆57Dec 18, 2023Updated 2 years ago
- a variety of tools,scripts and techniques developed and shared with different programming languages by 0xsp Lab☆64Dec 26, 2024Updated last year
- ☆216Jun 5, 2025Updated 10 months ago
- This library provides functionality for fetching and parsing information about Common Vulnerabilities and Exposures (CVE) using the NIST …☆14May 11, 2023Updated 2 years ago
- High-level Threat Intelligence playbooks☆21Mar 6, 2021Updated 5 years ago
- Cyber Threat Intelligence Repository expressed in STIX 2.0☆2,048Dec 19, 2025Updated 4 months ago
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆287Mar 20, 2025Updated last year