BRANDEFENSE / IoCLinks
☆24Updated last year
Alternatives and similar repositories for IoC
Users that are interested in IoC are comparing it to the libraries listed below
Sorting:
- The Brandefense cyber threat intelligence team is always researching new threats and writing research reports. Our latest Threat Reports …☆23Updated last month
- IOC Data Obtained From Karakurt Hacking Team's Internal Infrastructure☆34Updated 3 years ago
- ATLAS - Malware Analysis Description☆21Updated 2 years ago
- ☆43Updated 2 months ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆106Updated 3 years ago
- Source code used at TweetFeed.live☆47Updated 3 years ago
- Go module for striping CDN IP ranges.☆23Updated last month
- GUI for Volatility forensics tool written in PyQT5☆60Updated 4 years ago
- This repository contains indicators of compromise (IOCs) of our various investigations.☆308Updated 3 weeks ago
- Malware Analysis (Zararlı Yazılım Analizi)☆32Updated 6 years ago
- Cyber Threat Intelligence Data, Indicators, and Analysis☆102Updated last week
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆87Updated 3 years ago
- Open IOC sharing platform☆63Updated last year
- Malware Checker Tool generates an HTML report by comparing Hashes, Ip Addresses and URL Addresses through the VirusTotal database.☆36Updated 3 years ago
- Remote Code Execution vulnerability on ArcSight Logger☆20Updated 4 years ago
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆79Updated 2 years ago
- Linux Evidence Acquisition Framework☆118Updated last year
- Some malware samples or suspicious files I found and their reports.☆38Updated 4 years ago
- URL fingerprinting made easy☆89Updated last year
- This tool gives developers, researchers and companies the ability to analyze software packages of different programming languages that ar…☆69Updated 4 years ago
- Hive v5 file decryption algorithm☆34Updated 3 years ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆61Updated 3 years ago
- Active Directory Penetration Testing Tool☆28Updated 4 years ago
- Open Source Cyber Threat Intelligence Feed Collector☆17Updated 4 years ago
- ☆21Updated 2 years ago
- BlueBox Malware analysis Box and Cyber threat intelligence.☆43Updated 3 years ago
- ☆42Updated 7 months ago
- ☆96Updated 6 months ago
- Github action for monitoring CVE☆42Updated this week
- Sentello is python script that simulates the anti-evasion and anti-analysis techniques used by malware.☆75Updated 4 years ago