CYBERCOM-Malware-Alert / IOCs
☆19Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for IOCs
- BlackBerry Threat Research & Intelligence☆93Updated last year
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆80Updated 2 years ago
- Logbook for Digital Forensics and Incident Response☆49Updated 3 months ago
- Jupyter Notebooks for Cyber Threat Intelligence☆35Updated last year
- C2 Active Scanner☆47Updated 4 months ago
- A MITRE ATT&CK Lookup Tool☆43Updated 6 months ago
- ATT&CK Powered Suit is a browser extension that puts the complete MITRE ATT&CK® knowledge base at your fingertips with text search, conte…☆72Updated this week
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆49Updated 5 months ago
- Merge of two major cyber adversary datasets, MITRE ATT&CK and ETDA/ThaiCERT Threat Actor Cards, enabling victim/motivation-adversary-tech…☆50Updated 2 years ago
- The Threat Actor Profile Guide for CTI Analysts☆96Updated last year
- This directory contains presentations and related materials of my speaking engagements. I also use this to record historical presentation…☆14Updated 6 months ago
- CSIRT Jump Bag☆27Updated 6 months ago
- Library of threat hunts to get any user started!☆40Updated 4 years ago
- ☆18Updated 2 years ago
- Azure function to insert MISP data in to Azure Sentinel☆30Updated 2 years ago
- Python library for threat intelligence☆79Updated 4 months ago
- Collection of scripts provided for public use☆31Updated 3 weeks ago
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆116Updated 11 months ago
- Scripts to integrate DFIR-IRIS, MISP and TimeSketch☆31Updated 2 years ago
- Digital Forensics Artifacts Knowledge Base☆75Updated 5 months ago
- An experimental script to perform bulk parsing of arbitrary file features with YARA and console logging.☆21Updated last year
- Scripts and tools accompanying HP Threat Research blog posts and reports.☆48Updated 7 months ago
- User Feedback Space of #MitreAssistant☆37Updated last year
- 100 Days of YARA to be updated with rules & ideas as the year progresses☆56Updated last year
- A tool to support the reporting of Authenticode Certificates by reducing the effort on individuals to report.☆27Updated last month
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆57Updated 2 years ago
- Cyber Underground General Intelligence Requirements☆90Updated 9 months ago
- ☆19Updated last year
- This repository contains sample log data that were collected after running adversary simulations in Microsoft 365☆20Updated last month
- Python library to query various sources of threat intelligence for data on domains, file hashes, and IP addresses.☆30Updated last year