Not The Hidden Wiki
- Sigma rule converter - link
- YARA/Sigma rules - link
- Sigma SIEM rules - link
- Search for an extension or submit an extension ID to scan - link
- Free Malware samples - link
- AD Advanced threat huntung - link
- URLhaus is a project from abuse.ch with the goal of sharing malicious URLs that are being used for malware distribution. - link
- Reputation lookup - link
- MX Toolbox - link
- MurMurHash: This little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform. - link
- Phishcheck - link
- AIL Framework - link
- Docintel - link
- Yara Toolkit - link
- YarGen - link
- yaraQA - link
- YaraDbg - link
- YARA-L - link
- A curated list of awesome YARA rules, tools, and people. - link
- Extract and Visualize Data from URLs using Unfurl - link
- Yara-Rules: Repository of yara rules - link
- Repository containing Indicators of Compromise and Yara rules - link
- ThreatHunting - link
- YARA Rules for ProcFilter - link
- YaraHunts: Random hunting ordiented yara rules - link
- Yara-Rules: Repository of YARA rules made by McAfee ATR Team. - link
- mkYARA: Writing YARA rules for the lazy analyst link
- yara-validator: Validates yara rules and tries to repair the broken ones. - link
- Open Source Threat Intelligence Platform - link
- exonerator: Analyzes Tor network IP addresses, emphasizing exit nodes and assignment reasons - link
- iplist-firehol: Provides IP lists for enhanced network filtering and cybersecurity defense - link
- feodotracker: Monitors Feodo (Emotet) botnet activity for threat intelligence purposes - link
- fraudguard: A platform dedicated to fraud prevention and intelligence gathering - link
- honeydb: Collective repository for honeypot data, aiding in threat intelligence and cybersecurity research - link
- labs-inquest: Research platform providing cybersecurity insights and threat intelligence - link
- TI-Indicator-Search: provides daily threat intelligence feeds for malicious IP -link
- maldatabase: Platform for accessing a database of malware samples and associated information - link
- maltiverse: Threat intelligence platform facilitating the collection and sharing of cybersecurity indicators - link
- openphish: A database and repository for phishing URLs to enhance phishing threat intelligence - link
- signature-base: collection of signature based detection rules - link
- spamhaus: An organization providing real-time threat intelligence on spam and malware - link
- sslbl-abuse: Maintains a list of SSL certificates associated with malicious activities - link
- CTI-FAVICON - link
- IOC-MAKER - link
- manatin: Plugins oriented framework for cyber threat intelligence management - link
- typedb-cti: threat intelligence platform for organizing and managing CTI data - link
- malstrom: A tool for tracking threats, storing YARA rules, and aiding in incident response - link
- IntelOwl: An OSINT solution for retrieving threat intelligence data - link
- cortex: platform for analyzing and responding to cyber threats - link
- cuckoo: An automated dynamic malware analysis system used by researchers and security teams - link
- FireHOL-IP-Aggregator: An script for managing IP address feeds and appearance history - link
- forager: Script for hunting and gathering threat intelligence - link
- fenrir: A simple IOC scanner for detecting indicators of compromise - link
- goatrider: A tool for dynamically pulling threat intelligence feeds and comparing them - link
- GOOGLE-APT-Search-Engine: A Google Custom Search Engine focused on threat intelligence - link
- TI-GOSINT: A framework for collecting, processing, and exporting public indicators of compromise - link
- harbinger: A script to query multiple online threat aggregators from a single interface - link
- hiryu: A tool for organizing and visualizing APT campaign information and IOCs - link
- ioc-finder: A library for finding indicators of compromise in text using grammars - link
- ioc-parser: A tool to extract indicators of compromise from security reports in PDF - link
- iocextract: A tool for extracting IOCs from text files and enriching them with threat intelligence - link
- klara: A distributed system for scanning samples with Yara rules and generating scan results - link
- machiane: A tool for collecting intelligence from public sites and feeds about threath intelligence related data - link
- omnibus: An interactive command-line application for collecting and managing IOCs and artifacts - link
- ThreathTracer: A script for monitoring and generating alerts based on given sets of IOCs - link
- Suricata rules for network anomaly detection - link
- Awesome Threat Intelligence - link
- The Community Driven Cyber Threat Intelligence Library - link
- Tracking Ransomwares - link
- Daily feed of bad IPs (with blacklist hit scores) - link
- Ransomlook - link
- Telegram bot to get all messages real-time - link
- All-in-one vulnerability intelligence - link
- Onyphe: Cyber Defense Search Engine - link
- CTI-FAVICON - link
- IOC-MAKER - link
- UrlDna - link