☆96May 5, 2025Updated 9 months ago
Alternatives and similar repositories for Malware-IOCs
Users that are interested in Malware-IOCs are comparing it to the libraries listed below
Sorting:
- A YARA rules repository continuously updated for monitoring the old and new threats from articles, incidents responses ...☆141Nov 19, 2023Updated 2 years ago
- ☆14Mar 9, 2023Updated 2 years ago
- Ransomware leak site monitoring☆312Mar 7, 2022Updated 3 years ago
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆118Dec 13, 2023Updated 2 years ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆60Oct 28, 2022Updated 3 years ago
- A collection of intelligence about Log4Shell and its exploitation activity.☆184Mar 4, 2022Updated 4 years ago
- ☆44Jul 11, 2025Updated 7 months ago
- ☆18Mar 26, 2024Updated last year
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Feb 6, 2024Updated 2 years ago
- ☆10Dec 24, 2022Updated 3 years ago
- A Modular MWDB Utility to Collect Fresh Malware Samples☆34May 17, 2021Updated 4 years ago
- Collection of Malware Lures☆23Oct 8, 2021Updated 4 years ago
- ☆512Oct 7, 2024Updated last year
- IOC Collection 2022☆57Mar 7, 2023Updated 2 years ago
- Generate list of potential typo squatting domains with domain name permutation engine to feed AIL and other systems.☆102Apr 30, 2025Updated 10 months ago
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Jun 5, 2023Updated 2 years ago
- Indicators of Normality☆11Jul 22, 2022Updated 3 years ago
- Threat Detection Rules (Snort/Sigma/Yara)☆14Jan 23, 2024Updated 2 years ago
- Sigma rules to share with the community☆124Jan 29, 2025Updated last year
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Jan 8, 2024Updated 2 years ago
- ☆194Feb 6, 2024Updated 2 years ago
- Indicators of Compromise (IOCs) accompanying HP Threat Research blog posts and reports.☆29Apr 10, 2024Updated last year
- ☆129Jan 29, 2024Updated 2 years ago
- Script to pull newly-registered domains and check for similarity against a provided word list.☆13Aug 2, 2020Updated 5 years ago
- Repository to provide files related to our blog articles.☆16May 26, 2025Updated 9 months ago
- Cyber Threats Detection Rules☆14Sep 16, 2025Updated 5 months ago
- Active C2 IoCs☆99Nov 28, 2022Updated 3 years ago
- Sophos-originated indicators-of-compromise from published reports☆653Jan 16, 2026Updated last month
- Modular command-line threat hunting tool & framework.☆17Jul 20, 2020Updated 5 years ago
- Web Application for domain name monitoring / alerting☆64Aug 1, 2024Updated last year
- This repository contains supplemental items including IOCs, and signatures discussed in Huntress blogposts, and other media.☆47Updated this week
- A python library to parse OneNote (.one) files☆142Jul 11, 2024Updated last year
- ☆120Oct 5, 2022Updated 3 years ago
- Notes and IoCs of fresh malware☆62Jul 5, 2024Updated last year
- Sysmon EDR POC Build within Powershell to prove ability.☆223May 1, 2021Updated 4 years ago
- An easy to use PowerShell script to collect memory and disk forensics for DFIR investigations.☆341Dec 3, 2025Updated 3 months ago
- Automatically created C2 Feeds☆666Updated this week
- Threat Hunting queries for various attacks☆244Jan 16, 2026Updated last month
- ☆27Jul 11, 2022Updated 3 years ago