0xToxin / Malware-IOCs
Just my findings of malwares
☆43Updated 2 years ago
Alternatives and similar repositories for Malware-IOCs:
Users that are interested in Malware-IOCs are comparing it to the libraries listed below
- SMBMap is a handy SMB enumeration tool - here with Kerberos support☆73Updated 3 years ago
- IOC Collection 2022☆56Updated last year
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated last year
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆50Updated last month
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆59Updated 6 months ago
- Yara Rules for Modern Malware☆73Updated 10 months ago
- Hive v5 file decryption algorithm☆34Updated 2 years ago
- Scraping Kit is made up of several tools for scraping services for keywords, useful for initial enumeration of Domain Controllers or if y…☆97Updated last year
- ☆34Updated 11 months ago
- ☆31Updated 10 months ago
- ☆34Updated last year
- A full analysis report detailing as much as possible of a Malware or a Threat☆26Updated 7 months ago
- Advanced Email Threat Hunting w/ Detection as Code☆48Updated last month
- Default Detections for EDR☆96Updated 11 months ago
- ☆32Updated last year
- Script designed to identify CanaryTokens within Microsoft Office documents and Acrobat Reader PDF (docx, xlsx, pptx, pdf).☆110Updated last year
- Contains All tools i Use For Red Team OPs in Windows Environment. NOTE: I am not the Creator Of these tools. These are the tools i use.☆20Updated 2 years ago
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆50Updated last year
- Data breaches, Leaks, Malwares Forums List <Please Use Vpn/TOR don't click on Link directly bad OPSEC>☆45Updated this week
- C2 Active Scanner☆52Updated 7 months ago
- A collection of red blue team staff☆45Updated last year
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆59Updated 2 years ago
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆98Updated last year
- Some of my rough notes for Docker threat detection☆47Updated last year
- ☆51Updated 11 months ago
- APT hub, It help's research to collect information and data on the latest APT activities. It collects data on APT profiles, IOCs(1 yr), a…☆48Updated 3 months ago
- This Repository gives the best and possible strategies against hunting the ransomware☆25Updated 2 years ago
- ☆63Updated 2 years ago
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Updated last year
- ☆41Updated 2 years ago