☆241Jan 21, 2026Updated 2 months ago
Alternatives and similar repositories for malware-iocs
Users that are interested in malware-iocs are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Generates YARA rules to detect malware using API hashing☆17Mar 16, 2021Updated 5 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 7 years ago
- A Maltego transform for VirusTotal vHash☆32Oct 12, 2019Updated 6 years ago
- Scan outlook inbox with yara rules,APIs and IOCs☆14Aug 3, 2018Updated 7 years ago
- ☆29May 1, 2020Updated 5 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Just some lists of Malware Configs☆173Jan 9, 2025Updated last year
- ☆16Aug 25, 2025Updated 7 months ago
- This repository contains indicators of compromise (IOCs) of our various investigations.☆316Nov 4, 2025Updated 4 months ago
- NT AUTHORITY\SYSTEM☆44Jul 8, 2020Updated 5 years ago
- ☆16Apr 30, 2024Updated last year
- ☆15Jun 5, 2019Updated 6 years ago
- ☆23Jul 7, 2023Updated 2 years ago
- Repository containing IOCs, CSV and MISP JSON from our blogs☆83Aug 4, 2021Updated 4 years ago
- A pattern based Dalvik deobfuscator which uses limited execution to improve semantic analysis☆13Mar 22, 2022Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Indicators of compromise☆17Jan 29, 2026Updated 2 months ago
- Ursnif beacon decryptor☆27Mar 20, 2023Updated 3 years ago
- A tool to extract the DEX file from ODEX compiled ahead of time version.☆11Sep 28, 2021Updated 4 years ago
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Dec 10, 2017Updated 8 years ago
- Toolset for research malware and Cobalt Strike beacons☆211Mar 11, 2025Updated last year
- YARA, SIGMA, SNORT Rules based on Malware Analysis☆17Apr 23, 2025Updated 11 months ago
- Repository of YARA rules made by Trellix ATR Team☆627Mar 18, 2025Updated last year
- Popular Android malware seen in 2020☆330Jan 6, 2021Updated 5 years ago
- Indicators of Compromises (IOC) of our various investigations☆1,934Mar 19, 2026Updated last week
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- My articles for Paged Out! #2☆17Nov 20, 2019Updated 6 years ago
- This is a Ansible script for building a ready to go Cuckoo Sandbox server.☆26Mar 22, 2018Updated 8 years ago
- An AI-powered assistant for hackers and security professionals built for Caido☆31Jan 24, 2026Updated 2 months ago
- Threat Intel IoCs + bits and pieces of dark matter. Published by Gen Threat Labs.☆438Mar 20, 2026Updated last week
- 0xWPBF Wordpress scanner☆22May 5, 2019Updated 6 years ago
- Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups☆723Dec 26, 2022Updated 3 years ago
- Telsy CTI Research Team☆57Dec 15, 2020Updated 5 years ago
- Popular Android malware seen in 2022☆31Nov 8, 2022Updated 3 years ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆150Sep 22, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- This repository will hold PCAP IOC data related with known malware samples (owner: Bryant Smith)☆108Jul 29, 2021Updated 4 years ago
- Awesome VirusTotal Intelligence Search Queries☆333May 16, 2023Updated 2 years ago
- Python script to extract embedded data from binaries generated by SAPIEN Script Packager☆13Mar 20, 2024Updated 2 years ago
- ☆22Dec 22, 2020Updated 5 years ago
- Extract both control flow graphs and code parts from APK based on API calls.☆19Mar 22, 2023Updated 3 years ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Sep 17, 2019Updated 6 years ago
- ☆44Jul 11, 2025Updated 8 months ago