GoSecure / malware-iocLinks
Indicators of Compromise (IOCs) for malware we have researched
☆11Updated last year
Alternatives and similar repositories for malware-ioc
Users that are interested in malware-ioc are comparing it to the libraries listed below
Sorting:
- Honeybrid is a network application built to 1) administrate network of honeypots, and 2) transparently redirect live network sessions (TC…☆31Updated 6 years ago
- Discover potential timestamps within the Windows Registry☆19Updated 11 years ago
- ☆23Updated 5 years ago
- Artefacts from various retefe campaigns☆10Updated 6 years ago
- Bash scripts to help setup port redirects with iptables☆16Updated 8 years ago
- Multiple rules for yara-project for detect compiler/packer/protector☆33Updated 5 years ago
- Metasploit exploit suggester using OpenVAS XML output☆18Updated 6 years ago
- Ansible Playbook for setting up Datasploit☆14Updated 8 years ago
- Mattermost - Shodan Slash command☆31Updated 8 years ago
- Python bindings for Yeti's API☆18Updated last year
- DNS Enumeration and Reconnaissance Tool☆37Updated 9 years ago
- r2yara - Module for Yara using radare2 information☆35Updated last year
- IDS Utility Belt For Automating/Testing Various Things☆30Updated 4 years ago
- ☆50Updated 9 years ago
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Updated 9 years ago
- An active domain name query tool to help keep track of domain name movements...☆15Updated 4 years ago
- A short and small memory forensics helper.☆52Updated 7 years ago
- Rekall Forensics and Incident Response Framework with rVMI extensions☆33Updated 4 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆42Updated 4 years ago
- API Tools☆27Updated 9 years ago
- A simple command-line script to interact with the virustotal-api☆61Updated 7 years ago
- Quick & dirty script to get info on a file from online resources (VirusTotal, Team Cymru, Shadow Server etc.)☆30Updated 11 years ago
- Metadata Inspection Database Alerting System☆42Updated 11 years ago
- Simple Bash script to retrieve basic system information.☆30Updated 7 years ago
- Shared yara rules☆30Updated 11 years ago
- A modular pentesting framework implemented in C☆14Updated 6 years ago
- My personal experience in Threat Hunting and knowledge gained so far.☆19Updated 8 years ago
- PoC attack server for CVE-2015-7547 buffer overflow vulnerability in glibc DNS stub resolver (public version)☆10Updated 9 years ago
- Parses Java Cache IDX files☆39Updated 7 years ago
- This repository contains free Hybrid Analysis contributions to the IT-Security community☆27Updated 4 years ago