GoSecure / malware-iocLinks
Indicators of Compromise (IOCs) for malware we have researched
☆11Updated last year
Alternatives and similar repositories for malware-ioc
Users that are interested in malware-ioc are comparing it to the libraries listed below
Sorting:
- Discover potential timestamps within the Windows Registry☆18Updated 11 years ago
- Simple Bash script to retrieve basic system information.☆30Updated 7 years ago
- Artefacts from various retefe campaigns☆10Updated 6 years ago
- A reconnaissance tool that can quickly discover hostnames from a list of IP addresses.☆38Updated 14 years ago
- Bash scripts to help setup port redirects with iptables☆16Updated 8 years ago
- Mapping of Binaries that allows Arbitrary Code Execution☆25Updated 7 years ago
- DNS Enumeration and Reconnaissance Tool☆37Updated 9 years ago
- This repository is a curated list of pro bono incident response entities.☆20Updated last year
- Python bindings for Yeti's API☆18Updated last year
- IDS Utility Belt For Automating/Testing Various Things☆30Updated 4 years ago
- Set of PoC for exploits for QRadar SIEM☆15Updated 7 years ago
- A small wriiteup and a PoC tool about how to use SO_REUSADDR for firewall evasion☆26Updated 9 years ago
- A short and small memory forensics helper.☆52Updated 7 years ago
- Passive Spider uses search engines to find interesting information about a target domain.☆17Updated 11 years ago
- Multiple rules for yara-project for detect compiler/packer/protector☆33Updated 5 years ago
- My personal experience in Threat Hunting and knowledge gained so far.☆19Updated 8 years ago
- WPUpdate is a simple Linux service that automatically checks for a new version of Wordpress each night at 2AM.☆36Updated 11 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- Yara Scanner For IMAP Feeds and saved Streams☆28Updated 5 years ago
- Quick & dirty script to get info on a file from online resources (VirusTotal, Team Cymru, Shadow Server etc.)☆30Updated 10 years ago
- Megatron - A System for Abuse- and Incident Handling☆44Updated 8 years ago
- A modular pentesting framework implemented in C☆14Updated 6 years ago
- Metasploit exploit suggester using OpenVAS XML output☆18Updated 6 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆43Updated 8 years ago
- Flexible framework that allows automation to process cyber threat information and update endpoint defense tools.☆21Updated 6 years ago
- post-exploitation tools☆15Updated 7 years ago
- Honeybrid is a network application built to 1) administrate network of honeypots, and 2) transparently redirect live network sessions (TC…☆31Updated 6 years ago
- Simple IP Information Tools for Reputation Data Analysis☆23Updated 6 years ago
- Metadata Inspection Database Alerting System☆42Updated 11 years ago
- Tools to work with vulnerability standards.☆19Updated 11 years ago