Threat feeds designed to extract adversarial TTPs and IOCs, using: ✨AI✨
-
Updated
Oct 25, 2025 - Python
Threat feeds designed to extract adversarial TTPs and IOCs, using: ✨AI✨
An SSH metadata analyser used to showcase a timing-based attack on the protocol.
Repository of tools, YARA rules, and code-snippets from Stairwell's research team.
Scripts for importing threat feeds and CTI articles, blogs, and reports into MISP.
The Elastic Security Research team produces public-facing content, in the way of summary blogs, detailed releases, and artifacts; articulating both adversary campaign activities and threat detection steps that can be leveraged to frustrate adversary goals.
It provides a simple way to interact with the Odin API and access various services related to cybersecurity, certificates, and more
A public repository of quality research on cyber attack techniques. This is the backend for the Technique Research Report (TRR) Library.
senhasegura Identity Threat Labs is a premier threat intelligence center specializing in predictive analysis of identity-focused attack vectors. Using reverse engineering, malware analysis, and threat intelligence, our lab identifies emerging threats and provides actionable reports to help organizations strengthen defenses and mitigate risks.
A set of API's to catalog sets of saved-searches for the purpose of contextualizing research efforts & results. Batteries not included.
Frontend for the TRR Library.
Advanced Living Off the Land (LotL) tactics, tools, and abuse techniques for red teams, defenders, and cyber researchers. Stealth over payload.
PoC for CVE-2025-48384 - but with HTTPS instead
Cybersecurity Project: Scanning process relationships
Add a description, image, and links to the threat-research topic page so that developers can more easily learn about it.
To associate your repository with the threat-research topic, visit your repo's landing page and select "manage topics."