Small collection of tools to help speed up malware and CTI analysis.
-
Updated
Nov 28, 2025 - Go
Small collection of tools to help speed up malware and CTI analysis.
This Python script fetches a list of malicious IP addresses from Abuse CH's IP blocklist and dynamically adds them to the Windows firewall rules, blocking both outgoing and incoming connections to those IPs.
Cyber threat intelligence pipeline: abuse.ch feeds → Bruin → BigQuery → Streamlit dashboard. How fast do malicious URLs get taken down, and what malware is behind them?
Open-source CTI feed aggregator — 45K+ IOCs from 6 free feeds, zero dependencies, no API keys. Built by the AIguard team (aiguardai.com)
🛠️ Extract and analyze network-based IOCs from malware samples in various archive formats with GoVettersTools for enhanced security research.
Add a description, image, and links to the abuse-ch topic page so that developers can more easily learn about it.
To associate your repository with the abuse-ch topic, visit your repo's landing page and select "manage topics."