This repository is built for researchers, analysts, and fellow defenders working to curate and contribute to threat intelligence and threat hunting efforts. It’s a community-driven project designed to track, detect, and help prevent compromise by threat actors.
In addition to adversary tracking, this project also focuses on:
- Behavioral analysis of malware families seen in the wild
- Infrastructure mapping (C2s, proxies, phishing delivery)
- IOC curation and enrichment
- Context-driven case files and timeline analysis
Reach out to me via LinkedIn or Discord if you're interested in collaborating.
All contributors will be screened prior to repository access, and all submissions will be reviewed before they’re merged.
No. This is an independent, community-maintained project that is not affiliated with or owned by any commercial entity or employer.
All content here is for defensive research and educational use only.
No raw threat actor logs are hosted, and all indicators have been sanitized and redacted where appropriate.
- Markdown compatibility with Obsidian Notes. This has already started!
- Completely translate and map Black Basta ransomware group infrastructure based off of Matrix chat logs.
- Create detection opportunities for Black Basta indicators.