☆96May 5, 2025Updated 10 months ago
Alternatives and similar repositories for Malware-IOCs
Users that are interested in Malware-IOCs are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆121Updated this week
- Indicators of Compromise (IOCs) accompanying HP Threat Research blog posts and reports.☆29Apr 10, 2024Updated last year
- A YARA rules repository continuously updated for monitoring the old and new threats from articles, incidents responses ...☆141Nov 19, 2023Updated 2 years ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆60Oct 28, 2022Updated 3 years ago
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Feb 6, 2024Updated 2 years ago
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆121Mar 4, 2026Updated 3 weeks ago
- A collection of intelligence about Log4Shell and its exploitation activity.☆184Mar 4, 2022Updated 4 years ago
- ☆194Feb 6, 2024Updated 2 years ago
- Ransomware leak site monitoring☆312Mar 7, 2022Updated 4 years ago
- ☆512Oct 7, 2024Updated last year
- Active C2 IoCs☆99Nov 28, 2022Updated 3 years ago
- ☆44Jul 11, 2025Updated 8 months ago
- ☆14Mar 9, 2023Updated 3 years ago
- ☆129Jan 29, 2024Updated 2 years ago
- ☆18Mar 26, 2024Updated last year
- A Modular MWDB Utility to Collect Fresh Malware Samples☆34May 17, 2021Updated 4 years ago
- ☆10Dec 24, 2022Updated 3 years ago
- IOC Collection 2022☆57Mar 7, 2023Updated 3 years ago
- A library and a set of tools for exploiting and communicating with Google's Quick Share devices.☆49Apr 2, 2025Updated 11 months ago
- Generate list of potential typo squatting domains with domain name permutation engine to feed AIL and other systems.☆104Apr 30, 2025Updated 10 months ago
- Collection of Malware Lures☆23Oct 8, 2021Updated 4 years ago
- A python library to parse OneNote (.one) files☆143Jul 11, 2024Updated last year
- Threat Detection Rules (Snort/Sigma/Yara)☆14Jan 23, 2024Updated 2 years ago
- Indicators of Normality☆11Jul 22, 2022Updated 3 years ago
- Sophos-originated indicators-of-compromise from published reports☆652Jan 16, 2026Updated 2 months ago
- ☆34Nov 11, 2025Updated 4 months ago
- Sigma rules to share with the community☆124Jan 29, 2025Updated last year
- Phishing detection regex for Blueteams☆12Dec 27, 2020Updated 5 years ago
- IOC Data Obtained From Karakurt Hacking Team's Internal Infrastructure☆34Apr 22, 2022Updated 3 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆36Jan 20, 2022Updated 4 years ago
- Notes and IoCs of fresh malware☆62Jul 5, 2024Updated last year
- Creating a Feed of MISP Events from ThreatFox (by abuse.ch)☆19Jun 2, 2021Updated 4 years ago
- A tool for studying JavaScript malware.☆15Updated this week
- Threat Hunting queries for various attacks☆244Jan 16, 2026Updated 2 months ago
- This repository contains supplemental items including IOCs, and signatures discussed in Huntress blogposts, and other media.☆47Feb 27, 2026Updated 3 weeks ago
- shared samples from #dailyphish and/or #apt tweets☆41Sep 3, 2025Updated 6 months ago
- Cyber Threats Detection Rules☆14Sep 16, 2025Updated 6 months ago
- ☆10Oct 1, 2016Updated 9 years ago
- ☆154Feb 12, 2026Updated last month