BRANDEFENSE / IoCLinks
☆23Updated last year
Alternatives and similar repositories for IoC
Users that are interested in IoC are comparing it to the libraries listed below
Sorting:
- The Brandefense cyber threat intelligence team is always researching new threats and writing research reports. Our latest Threat Reports …☆22Updated 2 years ago
- IOC Data Obtained From Karakurt Hacking Team's Internal Infrastructure☆32Updated 3 years ago
- ATLAS - Malware Analysis Description☆21Updated 2 years ago
- Malware Checker Tool generates an HTML report by comparing Hashes, Ip Addresses and URL Addresses through the VirusTotal database.☆36Updated 3 years ago
- ☆66Updated 2 years ago
- Hive v5 file decryption algorithm☆34Updated 2 years ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆114Updated 3 years ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆105Updated 3 years ago
- Go module for striping CDN IP ranges.☆24Updated 5 years ago
- ☆21Updated 2 years ago
- Lazarus analysis tools and research report☆56Updated last year
- ☆43Updated 7 months ago
- Open IOC sharing platform☆60Updated 9 months ago
- Active Directory Penetration Testing Tool☆28Updated 3 years ago
- Repository for archiving Cobalt Strike configuration☆33Updated last week
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆86Updated 3 years ago
- Detecting Cobalt Strike Team Servers on targets through traffic telemetry.☆22Updated last year
- This tool gives developers, researchers and companies the ability to analyze software packages of different programming languages that ar…☆68Updated 4 years ago
- Source code used at TweetFeed.live☆44Updated 2 years ago
- Linux Evidence Acquisition Framework☆119Updated 11 months ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆60Updated 2 years ago
- Surface Analysis System on Cloud☆19Updated last year
- ☆12Updated 2 years ago
- Carbon Black Response IR tool☆54Updated 4 years ago
- This repository contains indicators of compromise (IOCs) of our various investigations.☆290Updated last week
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆28Updated 2 years ago
- Cyber Threat Intelligence Data, Indicators, and Analysis☆95Updated last month
- Pointer was developed for massive hunting and mapping Cobalt Strike servers exposed on the internet.☆68Updated 3 years ago
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Updated 2 years ago
- ☆96Updated 3 months ago