Content is user-generated and unverified.

Vulnerabilities, Feeds, OSIs - Complete Documentation

Table of Contents

  1. Initial Assessment List
  2. Wibix AWS Instance API Feeds and Data Dumps
  3. Breachdata from Kaggle
  4. Data from MISP Instance
  5. Data from OpenCTI
  6. Comparative Analysis

Initial Assessment List

1. Malicious IP Sources

SourceStatusNotes
AbuseIPDB✅ Done
Greynoise🔄 Query Endpoint
Firehol✅ Done

2. Malicious URL Sources

SourceStatusNotes
URLhaus✅ Done
Phishtank✅ Done
Threatfox✅ Done

3. Blacklisted IP Sources

SourceStatusNotes
Alienvault✅ Done
CyberCrimeTracker📱 Telegram

4. Phishing Sources

SourceStatusNotes
Openphish❌ Not Free
Phishstats✅ Done
MISP✅ Covered with MISP

5. Domain Intelligence

SourceStatusNotes
ThreatCrowd❌ Not Free
Emerging Threats❌ Not Free

6. Subdomain Intelligence

SourceStatusNotes
PassiveTotal❌ Not Free
SecurityTrails🔄 Query Endpoint
Censys❌ Not Free

7. Zero-day Intelligence

SourceStatusNotes
NVD❌ Not Free
Vuldb🔄 Ongoing

8. File Hash Intelligence

SourceStatusNotes
MalwareBazaar✅ Done
Virustotal❌ Not Free
Hybrid Analysis❌ Old Github, Not updated

9. Email Intelligence

SourceStatusNotes
PhishTank✅ Done
Have I been Emotet❌ No access

10. Dark Web Intelligence

SourceStatusNotes
Dark Feed✅ Done
Intsights❌ No access
Darktracer❌ Old Github

11. Credential Breach Intelligence

SourceStatusNotes
HaveIBeenPwned❌ No free access
Scylla.sh❌ No free access
BreachDirectory⏳ Waiting for access

Wibix AWS Instance API Feeds and Data Dumps

1. IP Intelligence

SourceStatus
Firehol✅ Done
Alienvault✅ Done
Threatfox✅ Done

2. URL Intelligence

SourceStatus
Alienvault✅ Done
Threatfox✅ Done
URLhaus✅ Done

3. Blacklisted IP

SourceStatus
Alienvault✅ Done
Abuseipdb✅ Done

4. Phishing

SourceStatus
Phishstats✅ Done
Phishtank✅ Done

5. Domain Intelligence

SourceStatus
Alienvault✅ Done
Threatfox✅ Done

6. Subdomain Intelligence

SourceStatus
Threatfox✅ Done

7. Zero-day Intelligence

SourceStatus
VulDB🔄 Ongoing

8. File Hashes

SourceStatus
Threatfox✅ Done
Alienvault✅ Done
MalwareBazaar✅ Done
URLhaus✅ Done

9. Email Intelligence

SourceStatus
URLhaus✅ Done

10. Dark Web

SourceStatus
DarkFeed✅ Done

11. Credential Breaches

SourceStatus
Chronology✅ Done
Kaggle✅ Done

12. SSL Certificate

SourceStatus
Abuse.ch✅ Done

13. Hostname Intelligence

SourceStatus
Alienvault✅ Done

14. YARA Rules

SourceStatus
Yarafy✅ Done

Breachdata from Kaggle

Available Datasets

  1. Blockchain Network Transaction
  2. Company Data
  3. HIPAA Data
  4. Credit Card Transactions
  5. Education Institute Email
  6. Public Profiles
  7. Twitter IDs - https://github.com/elliotwutingfeng/Twitter200M - Remaining

Data from MISP Instance

IOC Types (Complete List - 92 Types)

IDIOC TypeDescription
1asAutonomous System Number (ASN) used to identify network owners
2attachmentBase64-encoded file or email attachment
3authentihashWindows PE file hash that excludes checksum, signature, and timestamp
4btcBitcoin wallet address, used in crypto-related fraud or ransomware
5campaign-idIdentifier for a threat campaign or operation
6commentAnalyst or automated comment describing context or relevance
7cookieHTTP cookie used in tracking or malware C2
8counterNumerical value representing event counts or thresholds
9cpeCommon Platform Enumeration string to identify software/hardware
10dns-soa-emailEmail in SOA DNS record, identifies domain admin
11domainFully Qualified Domain Name (FQDN), often for C2 or phishing
12domain|ipHybrid of domain and IP to preserve resolution relationships
13email-attachmentFile name or metadata of an email attachment
14email-bodyBody content of an email, used in phishing analysis
15email-dstRecipient email address (To: field)
16email-headerRaw email header lines (e.g., Received:, X-Mailer:)
17email-message-idEmail's unique identifier (Message-ID header)
18email-mime-boundaryMIME boundary used to segment email parts
19email-reply-toAddress in Reply-To: header — often spoofed
20email-srcSender email address (From: field)
21email-src-display-nameDisplay name of sender — used in spoofing
22email-subjectSubject line of the email
23email-x-mailerEmail client or tool used to send the message
24filenameName of a file, useful in malware or phishing campaigns
25filename-patternRegex or wildcard pattern of filenames
26filename|md5Filename paired with an MD5 hash
27filename|sha1Filename paired with a SHA1 hash
28filename|sha256Filename paired with a SHA256 hash
29github-repositoryURL or name of a GitHub repo (threat actor infra)
30github-usernameGitHub handle of an author or threat actor
31hexArbitrary hex-encoded data (e.g., shellcode, keys)
32hostnameHostname (often internal), not FQDN
33http-methodHTTP verbs like GET, POST, PUT — used in traffic profiling
34ibanInternational Bank Account Number (often in fraud)
35imphashImport hash of PE files for clustering malware
36ip-dstDestination IP address
37ip-dst|portIP and port tuple for destination socket
38ip-srcSource IP address
39ip-src|portIP and port tuple for source socket
40ja3-fingerprint-md5TLS client fingerprint (JA3), MD5 hash of fingerprint
41jabber-idXMPP/Jabber ID — used for threat actor comms
42jarm-fingerprintTLS server fingerprint (JARM), detects infra reuse
43linkExternal link to blog, report, or malware download
44malware-sampleMalware binary attached as a sample or hash reference
45md5MD5 hash of a file or object
46mime-typeFile MIME type (e.g., application/pdf)
47mobile-application-idApp ID (e.g., Android package name or iOS bundle ID)
48mutexNamed mutual exclusion object — malware often uses these
49named pipeWindows IPC pipe name used by malware or legit software
50otherMiscellaneous custom value (avoid when possible)
51pattern-in-fileKnown byte/text pattern found inside a file
52pattern-in-memoryPattern found in process memory (YARA-like match)
53pattern-in-trafficPattern match in network packet/stream
54pdbPath to debug symbol (PDB) — used to fingerprint builds
55pehashStructural PE hash (for malware clustering)
56phone-numberInternational-format phone number
57portNetwork port number (0–65535)
58regkeyWindows Registry key path
59regkey|valueRegistry key and its value together
60sha1SHA1 hash of a file or object
61sha224SHA224 hash (rare, but supported)
62sha256SHA256 hash (standard for most malware)
63sha384SHA384 hash (rare in threat intel)
64sha512SHA512 hash (used in large file validation)
65sigmaSigma rule used for detecting behavior in logs
66size-in-bytesFile size in bytes
67snortSnort IDS signature rule
68ssdeepContext-triggered fuzzy hash (used in clustering)
69stix2-patternSTIX 2.0 pattern for structured indicator sharing
70target-externalOrganization/individual being targeted (external to reporting org)
71target-locationGeographic location of the intended victim
72target-orgName or ID of target organization
73textGeneric text block (useful for strings or descriptions)
74threat-actorName of an actor or group (APT29, FIN7, etc.)
75tlshTrend Micro Locality Sensitive Hash (used for clustering)
76twitter-idTwitter handle or numeric ID
77uriRelative URI path — useful for URL pattern matching
78urlFull URL including scheme (e.g., http://evil.com/payload)
79user-agentHTTP User-Agent string
80vhashSymantec VHASH — structural hash for malware
81vulnerabilityCVE or other vulnerability ID (e.g., CVE-2023-23397)
82weaknessCWE identifier describing vulnerability class
83whois-registrant-emailEmail of domain registrant from WHOIS data
84whois-registrant-nameName of domain registrant
85whois-registrant-phonePhone of domain registrant
86whois-registrarWHOIS registrar (e.g., GoDaddy, Namecheap)
87windows-scheduled-taskName of scheduled task in Windows
88windows-service-nameName of a service installed on Windows
89x509-fingerprint-md5MD5 fingerprint of an X.509 cert
90x509-fingerprint-sha1SHA1 fingerprint of an X.509 cert
91x509-fingerprint-sha256SHA256 fingerprint of an X.509 cert
92yaraYARA rule used to detect file or behavior

MISP Feeds (57 Active Feeds)

IDFeed NameProviderURL
1CIRCL OSINT FeedCIRCLhttps://www.circl.lu/doc/misp/feed-osint
2The Botvrij.eu DataBotvrij.euhttps://www.botvrij.eu/data/feed-osint
3blockrules of rules.emergingthreats.netrules.emergingthreats.nethttps://rules.emergingthreats.net/blockrules/compromised-ips.txt
4Tor exit nodesTOR Node List from dan.me.ukhttps://www.dan.me.uk/torlist/?exit
5Tor ALL nodesTOR Node List from dan.me.ukhttps://www.dan.me.uk/torlist/
6cybercrime-tracker.net - allcybercrime-tracker.nethttps://cybercrime-tracker.net/all.php
7Phishtank online valid phishingPhishtankhttps://data.phishtank.com/data/online-valid.csv
8ip-block-list - snort.orghttps://snort.orghttps://snort.org/downloads/ip-block-list
9diamondfox_panelspan-unit42https://raw.githubusercontent.com/pan-unit42/iocs/master/diamondfox/diamondfox_panels.txt
10pop3gropershome.nuug.nohttps://home.nuug.no/~peter/pop3gropers.txt
11Feodo IP Blocklistabuse.chhttps://feodotracker.abuse.ch/downloads/ipblocklist.csv
12OpenPhish url listopenphish.comhttps://openphish.com/feed.txt
13firehol_level1iplists.firehol.orghttps://raw.githubusercontent.com/ktsaou/blocklist-ipsets/master/firehol_level1.netset
14IPs from High-Confidence DGA...osint.bambenekconsulting.comhttps://osint.bambenekconsulting.com/feeds/c2-ipmasterlist-high.txt
15Domains from High-Confidence DGA...osint.bambenekconsulting.comhttps://osint.bambenekconsulting.com/feeds/c2-dommasterlist-high.txt
16ci-badguys.txtcinsscore.comhttps://cinsscore.com/list/ci-badguys.txt
17alienvault reputation generic.alienvault.comhttps://reputation.alienvault.com/reputation.generic
18blocklist.de/lists/all.txtblocklist.dehttps://lists.blocklist.de/lists/all.txt
19VNC RFBdataplane.orghttps://dataplane.org/vncrfb.txt
20URLhaus URL Feedabuse.chhttps://urlhaus.abuse.ch/downloads/csv_recent/
21URLhaus Payloads Feedabuse.chhttps://urlhaus.abuse.ch/downloads/payloads/csv_recent/
22ThreatFox Indicatorsabuse.chhttps://threatfox.abuse.ch/downloads/
23SSL Blacklistabuse.chhttps://sslbl.abuse.ch/blacklist/sslipblacklist.csv
24Maltrail Anomaliesmaltrailhttps://github.com/stamparm/maltrail
25Bambenek DGA Domains - HighBambenek Consultinghttps://osint.bambenekconsulting.com/feeds/dga-feed-high.csv
26MalwareBazaar Recent Binariesabuse.chhttps://bazaar.abuse.ch/downloads/csv/
27Malc0de Database Feedmalc0de.comhttp://malc0de.com/bl/IP_Blacklist.txt
28Emerging Threats Compromised IPsProofpoint Emerging Threatshttps://rules.emergingthreats.net/blockrules/compromised-ips.txt
29AlienVault IP ReputationAlienVaulthttps://reputation.alienvault.com/reputation.snort
30Cisco Talos IP BlacklistCisco Taloshttps://www.talosintelligence.com/documents/ip-blacklist
31SANS Suspicious DomainsSANS ISChttps://isc.sans.edu/feeds/suspiciousdomains_Medium.txt
32SANS Suspicious IPsSANS ISChttps://isc.sans.edu/feeds/block.txt
33GreenSnow IP BlacklistGreenSnowhttps://blocklist.greensnow.co/greensnow.txt
34BruteForceBlocker IP Listdanger.rulez.skhttp://danger.rulez.sk/projects/bruteforceblocker/blist.php
35Zeus Tracker Domain Blocklistabuse.chhttps://zeustracker.abuse.ch/blocklist.php?download=domainblocklist
36Zeus Tracker IP Blocklistabuse.chhttps://zeustracker.abuse.ch/blocklist.php?download=ipblocklist
37Zeus Tracker URL Blocklistabuse.chhttps://zeustracker.abuse.ch/blocklist.php?download=urlblocklist
38DNS-BH Malware Domainsmalwaredomains.comhttps://mirror1.malwaredomains.com/files/justdomains
39MalwareDomains.com Hostsmalwaredomains.comhttps://mirror1.malwaredomains.com/files/hosts
40CIRCL Passive DNS FeedCIRCLhttps://www.circl.lu/doc/misp/feed-passive-dns/
41CIRCL Passive SSL FeedCIRCLhttps://www.circl.lu/doc/misp/feed-passive-ssl/
42CIRCL SSL Blacklist FeedCIRCLhttps://sslbl.abuse.ch/blacklist/
43CIRCL APT Groups FeedCIRCLhttps://www.circl.lu/doc/misp/feed-apt/
44CIRCL Botnet C2 FeedCIRCLhttps://www.circl.lu/doc/misp/feed-botcc/
45CIRCL Phishing FeedCIRCLhttps://www.circl.lu/doc/misp/feed-phishing/
46CIRCL Spamhaus Drop FeedSpamhaushttps://www.spamhaus.org/drop/drop.txt
47CIRCL Spamhaus eDrop FeedSpamhaushttps://www.spamhaus.org/drop/edrop.txt
48CIRCL Malc0de IP FeedCIRCLhttp://malc0de.com/bl/IP_Blacklist.txt
49CIRCL MalwareBazaar Hash Feedabuse.chhttps://bazaar.abuse.ch/downloads/hashlist.csv
50CIRCL ThreatFox Feedabuse.chhttps://threatfox.abuse.ch/downloads/
51CIRCL ThreatFox URL Feedabuse.chhttps://threatfox.abuse.ch/downloads/url/
52CIRCL Feodo Tracker IP Feedabuse.chhttps://feodotracker.abuse.ch/downloads/ipblocklist.csv
53CIRCL SSLBL Feedabuse.chhttps://sslbl.abuse.ch/blacklist/sslipblacklist.csv
54CIRCL OpenPhish FeedOpenPhishhttps://openphish.com/feed.txt
55CIRCL Bambenek Consulting DGA DomainsBambenek Consultinghttps://osint.bambenekconsulting.com/feeds/dga-feed-high.csv
56CIRCL SANS Suspicious IPs FeedSANS ISChttps://isc.sans.edu/feeds/block.txt
57CIRCL AlienVault IP Reputation FeedAlienVaulthttps://reputation.alienvault.com/reputation.snort

Data from OpenCTI

Observable Types (17 Core Types)

TypeDescriptionExamplesUsage
artifactA file or piece of data collected from a system that may indicate compromiseMemory dumps, dropped files, disk images, log filesUsed to analyze malware, detect persistence, or identify data exfiltration
autonomous-systemA globally unique identifier (ASN - Autonomous System Number) assigned to a network managed by a single organizationAS13335 (Cloudflare), AS15169 (Google)Often tied to malicious infrastructure or C2 hosting
cryptocurrency-walletA unique wallet address on a blockchain used for storing or transferring cryptocurrencyBTC: 1BoatSLRHtKNngkdXEeobR76b53LETtpyT
ETH: 0x742d35Cc6634C0532925a3b844Bc454e4438f44e
Tied to ransomware payments, laundering, or illicit finance
domain-nameA fully qualified domain name (FQDN) used in attacksevil-c2.example.comDomains for phishing, malware delivery, or C2
email-addrAn email address used for attack orchestration or exfiltrationattacker@malicious.comFound in phishing, spear-phishing, BEC campaigns
email-messageFull email content or headers that can provide contextEmail with malicious link or payloadTied to phishing kits or social engineering campaigns
hostnameName of a computer on a network (often internal)WIN-7V45U6, DC01.corp.localUseful in lateral movement tracking or internal recon
ipv4-addrA 32-bit IPv4 address involved in malicious activity192.168.1.10, 8.8.8.8Common for IP-based IOC tracking like C2 servers, scanners
ipv6-addrA 128-bit IPv6 address2001:4860:4860::8888Growing use in modern C2 comms or stealth ops
mutexA named object in OS used by malware to avoid multiple instances or syncGlobal\MyMalwareMutex123Used in memory for malware identification or behavior tracking
softwareA specific piece of software, typically identified by vendor, name, versionApache Log4j 2.14.1Tied to vulnerabilities (e.g., CVEs), exploited apps
stixfileSTIX (Structured Threat Information eXpression) formatted file containing threat intel.stix or .json files with threat dataUsed for intel sharing and correlation across platforms
textFreeform text string that doesn't fit other IOC typesExploit strings, malware family names, TTPsDescriptions, labels, or pivoting identifiers
urlA full web address used in phishing, redirection, or C2http://malicious[.]com/download.exeCommon in phishing or malvertising campaigns
windows-registry-keyA Windows Registry path or key associated with malwarePersistence: HKCU\Software\Microsoft\Windows\CurrentVersion\Run\malwareTracks persistence, privilege escalation, or configuration changes
x509-certificateA digital certificate used in SSL/TLS or code signing, often stolen or abusedCerts with fake or compromised CNsTracks malicious HTTPS traffic or signed malware
Malware Hashessha1, md5, sha256Various hash formats for file identificationStandard malware identification and tracking

Feed Information Sources

1. OpenCTI Live Streams

2. TAXII Collections

3. Data Import Sources (80+ Connectors)

CategorySources
Abuse/MalwareAbuse SSL, AbuseIPDB IP Blacklist, MalwareBazaar, MalwareBazaar Recent Additions
Threat IntelligenceAccenture ACTI, Alienvault, Bambenek Labs, Cybersixgill, Flashpoint, Intel 471, Intel 471 V2
SandboxesAnyrun Feed, Cape Sandbox, Cuckoo Sandbox, Hybrid Analysis, Joe Sandbox
CampaignsAPT & Cybercriminals Campaign Collection, Catalyst, Crowdstrike, Dragos
VulnerabilityCISA Known Exploited Vulnerabilities, NIST NVD CPE Database, NIST NVD CVE Database
EmailCofense ThreatHQ, Email Intel IMAP, Email Intel Microsoft
FrameworkDISARM Framework, MITRE Atlas, MITRE ATT&CK
CommercialMandiant, Microsoft Defender Incidents, Microsoft Sentinel Incidents, Recorded Future
Open SourceOpenCTI Datasets, Malpedia, Maltiverse, Phishunt.io
CertificatesCert.PL MWDB, crt.sh
FeedsMISP, MISP Feed, Orange Cyberdefense, Ransomware.live
CloudS3 Bucket, RST Cloud
Dark WebDisinfox, Hunt IO
SecuritySEKOIA.IO, Silobreaker, SOC Prime, SOC Radar
Incident ResponseSentinelOne Incidents, SentinelOne Threats, Tanium Incidents, TheHive
Threat FeedsThreat Fox by Abuse.ch, ThreatMatch, URLhaus by Abuse.ch, URLhaus Recent Payloads
VulnerabilityTenable Security Center, Tenable Vulnerability Management, Vulmatch, VulnCheck
ScanningUrlscan.io, Valhalla, VX Vault
EnterpriseWIZ, ZeroFox, Zvelo

4. Enrichment Sources (40+ Connectors)

CategorySources
IP/DomainAbuseIPDB, DNSTwist, DomainTools, Google DNS, Host.io, IPinfo, IPQS, Shodan, Shodan InternetDB
SandboxesAny.run task, CAPE Sandbox, Cuckoo Sandbox, Hatching Triage Sandbox, Hybrid Analysis Sandbox, Intezer Sandbox, Joe Sandbox
Threat IntelligenceCrowdSec, FIRST EPSS, Gatewatcher Lastinfos
Content is user-generated and unverified.
    Formatted Vulnerability Feeds & OSI Sources Document | Claude