401trg / detectionsLinks
This repository contains all public indicators identified by 401trg during the course of our investigations. It also includes relevant yara rules and ids signatures to detect these indicators.
☆122Updated 4 years ago
Alternatives and similar repositories for detections
Users that are interested in detections are comparing it to the libraries listed below
Sorting:
- Malware Sinkhole List in various formats☆103Updated 2 years ago
- Cuckoo Sandbox is an automated dynamic malware analysis system☆107Updated 5 years ago
- Repository containing IOCs, CSV and MISP JSON from our blogs☆81Updated 3 years ago
- Personal compilation of APT malware from whitepaper releases, documents and own research☆260Updated 6 years ago
- Malware/IOC ingestion and processing engine☆105Updated 6 years ago
- Imports Alienvault OTX pulses to a MISP instance☆53Updated 3 years ago
- TIH is an intelligence tool that helps you in searching for IOCs across multiple openly available security feeds and some well known APIs…☆152Updated last week
- Tool to extract indicators of compromise from security reports in PDF format☆72Updated last year
- Mapping NSM rules to MITRE ATT&CK☆71Updated 4 years ago
- IOC (Indicator of Compromise) Extractor: a program to help extract IOCs from text files.☆134Updated 9 years ago
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆102Updated 2 weeks ago
- A web-based tool to assist the work of the intuitive threat analysts.☆113Updated 6 years ago
- Dovehawk is a Zeek module that automatically imports MISP indicators and reports Sightings☆122Updated 3 years ago
- Log Entry to Sigma Rule Converter☆108Updated 3 years ago
- Collecting & Hunting for IOCs with gusto and style☆240Updated 3 years ago
- Threat Alert Logic Repository☆92Updated 6 years ago
- Understanding ATT&CK Matrix for Enterprise☆80Updated 7 years ago
- A modular Python application to pull intelligence about malicious files☆122Updated 4 years ago
- This script scans the files extracted by Zeek with YARA rules located on the rules folder on a Linux based Zeek sensor, if there is a mat…☆62Updated last year
- This repository will hold PCAP IOC data related with known malware samples (owner: Bryant Smith)☆104Updated 3 years ago
- A tool to assess data quality, built on top of the awesome OSSEM.☆78Updated 2 years ago
- ☆203Updated 2 years ago
- Python abstract API for PassiveTotal services in the form of libraries and command line utilities.☆85Updated 2 years ago
- All the IOC's I have gathered which are used directly involved coronavirus / covid-19 / SARS-CoV-2 cyber attack campaigns☆65Updated 4 years ago
- Django web interface for managing Yara rules☆193Updated 6 years ago
- Cyber Threat Intelligence Feeds☆96Updated 8 years ago
- Splunk Boss of the SOC v1 data set.☆111Updated 7 years ago
- A mapping of used malware names to commonly known family names☆62Updated 2 years ago
- Web based Manager for Yara Rules☆58Updated 5 years ago
- Hunting IOCs all day every day...☆86Updated last year