CofenseLabs / Coronavirus-Phishing-Yara-RulesView external linksLinks
Repository of Cofense Coronavirus Phishing Yara Rules (details can be found here: https://cofense.com/solutions/topic/coronavirus-infocenter/)
☆10Jul 7, 2020Updated 5 years ago
Alternatives and similar repositories for Coronavirus-Phishing-Yara-Rules
Users that are interested in Coronavirus-Phishing-Yara-Rules are comparing it to the libraries listed below
Sorting:
- ☆12Jun 29, 2021Updated 4 years ago
- Minimal Indicator Storage System☆11Feb 8, 2021Updated 5 years ago
- command line tool to use the DNSDB Flexible Search API extensions.☆16Aug 5, 2024Updated last year
- Definition, description and relationship types of MISP objects☆105Feb 10, 2026Updated last week
- This is a python version of samesame repo to generate homograph strings☆23Aug 22, 2018Updated 7 years ago
- r2yara - Module for Yara using radare2 information☆35Oct 10, 2023Updated 2 years ago
- Simple Docker Honeypot server emulating small snippets of the Docker HTTP API☆33Oct 6, 2020Updated 5 years ago
- ☆32Feb 3, 2026Updated 2 weeks ago
- List and description of know cyber attacks☆14Jan 12, 2025Updated last year
- Terraform scripts for deploying OpenCTI to AWS, Azure, and GCP☆33Apr 2, 2024Updated last year
- ☆28Feb 13, 2017Updated 9 years ago
- OpenCTI Add-On for Splunk☆13Jan 13, 2026Updated last month
- ☆21Jan 8, 2024Updated 2 years ago
- A curated list of awesome YARA rules, tools, and people.☆33Oct 26, 2023Updated 2 years ago
- SMB Auto authentication Vulnerability☆34Aug 1, 2016Updated 9 years ago
- the fastest way to consume threat intelligence.☆31Mar 9, 2023Updated 2 years ago
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- A collection of utilities to gain user path insights from exported FullStory data.☆12Sep 13, 2023Updated 2 years ago
- Some basic shell code, when I learn <Gray Hat Hacking>☆11Dec 6, 2014Updated 11 years ago
- ☆11Jan 28, 2024Updated 2 years ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- Metasploit framework via HTTP services☆10Jul 31, 2021Updated 4 years ago
- ☆11Jan 25, 2019Updated 7 years ago
- ☆12Jan 17, 2023Updated 3 years ago
- CloudZero Account provisioning automation for AWS☆14Dec 12, 2025Updated 2 months ago
- GreenLambert macOS IDA plugin to deobfuscate strings☆14Oct 4, 2021Updated 4 years ago
- Python 3 implementation of the VirusTotal v3 API☆82Jan 26, 2023Updated 3 years ago
- AuditParser☆60Aug 28, 2013Updated 12 years ago
- ☆47Apr 10, 2023Updated 2 years ago
- Publishing advisories for CVEs found by POST Cyberforce☆13Jan 7, 2025Updated last year
- ☆10Jan 22, 2025Updated last year
- Automatically exported from code.google.com/p/windbgshark☆11Jul 1, 2015Updated 10 years ago
- Impacket is a collection of Python classes for working with network protocols.☆10Jun 15, 2023Updated 2 years ago
- ☆13Jul 14, 2020Updated 5 years ago
- ☆11Oct 23, 2020Updated 5 years ago
- Attempts to brute force the password of a zip file☆10May 31, 2016Updated 9 years ago
- 🧙🏽♂️ Visualize wink-nlp's features☆11Dec 9, 2020Updated 5 years ago
- Baseline organizational policies and practices☆10Apr 17, 2017Updated 8 years ago
- ChatSecure for OS X☆12Mar 27, 2017Updated 8 years ago