☆14Sep 22, 2023Updated 2 years ago
Alternatives and similar repositories for malware-IoC
Users that are interested in malware-IoC are comparing it to the libraries listed below
Sorting:
- Extended Static Analysis Tool for Analyzing Android APK Files.☆15Jan 3, 2024Updated 2 years ago
- Specific C2 Detection Tool Written To Detect C2 Servers From RisePro Stealer Malware.☆13Nov 10, 2023Updated 2 years ago
- Basically pipes.sh but rewritten in Python☆13Nov 16, 2025Updated 4 months ago
- [BASH] Password generator through a wordlist☆12Mar 15, 2013Updated 13 years ago
- Specific C2 Detection Tool Written To Detect C2 Servers From Rhadamanthys Stealer Malware.☆16Nov 10, 2023Updated 2 years ago
- Repository for archiving Cobalt Strike configuration☆36Mar 11, 2026Updated last week
- ☆17Mar 8, 2024Updated 2 years ago
- The Ranflood ransomware contrast tool☆18Dec 18, 2024Updated last year
- ☆34Nov 11, 2025Updated 4 months ago
- Sigma Queries turned into KQL for Defender using pysigma☆12Jun 20, 2024Updated last year
- Repository with simples C binary samples for beginners REs & Defenders☆10May 29, 2024Updated last year
- KQL Detections for Microsoft Sentinel and Microsoft 365 Defender☆21Nov 15, 2024Updated last year
- Ransomware groups posts☆44Mar 3, 2026Updated 2 weeks ago
- Forensics scripts aimed at automating & enhancing the Forensics Legend Eric Zimmerman's techniques, integrating the statistical detection…☆18Sep 7, 2023Updated 2 years ago
- a lightweight and simple cli package☆12Nov 22, 2021Updated 4 years ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆69Dec 27, 2023Updated 2 years ago
- ☆120May 26, 2025Updated 9 months ago
- Michael Melone's Kusto Query library☆20Nov 17, 2023Updated 2 years ago
- Corporative registry worldwide catalog. 63 countries☆16Jun 24, 2022Updated 3 years ago
- Tool for dropping malware from EK☆40Feb 9, 2018Updated 8 years ago
- DEPRECATED -> GO TO https://github.com/microsoft/Microsoft-threat-protection-Hunting-Queries☆20Apr 22, 2020Updated 5 years ago
- Frequently asked questions☆46Nov 25, 2025Updated 3 months ago
- ☆13Dec 21, 2023Updated 2 years ago
- Universal stealer malware logs parser. It retrieves all the compromised accounts and credit cards data from malware logs. Made for cyber …☆105Jul 31, 2023Updated 2 years ago
- Excel to json so easily, read from local source or remote source☆15Aug 31, 2021Updated 4 years ago
- A repo to centralize some of the regular expressions I've found useful over the course of my DFIR career.☆107Mar 12, 2026Updated last week
- ☆15Jul 3, 2025Updated 8 months ago
- Tool to use Nmap, in Flask with different types of scans. 👁☆14Mar 12, 2026Updated last week
- CLI tool to analyze APKs☆42Mar 28, 2024Updated last year
- Yet Another Mac Changer!!!☆12Jan 26, 2023Updated 3 years ago
- Higher level abstraction for franz-go.☆22Aug 22, 2022Updated 3 years ago
- A Bash script to obfuscate Bash script☆38Sep 13, 2020Updated 5 years ago
- Useful OSINT hints and links☆213May 13, 2023Updated 2 years ago
- ☆11Jul 17, 2022Updated 3 years ago
- Plugin for easily integrating SAP CDC functionality and flows into your Flutter app.☆16Jan 13, 2026Updated 2 months ago
- SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty☆18Feb 9, 2024Updated 2 years ago
- A tool to view the total transactions, received, sent, and current balance of Bitcoin wallets 👁☆18Aug 19, 2025Updated 7 months ago
- An automated script to extract hidden images from Tecno Camon X☆12Sep 23, 2023Updated 2 years ago
- The OWASP Amass Homebrew Formula☆17Jul 13, 2025Updated 8 months ago