GoSecure / malware-ioc
Indicators of Compromise (IOCs) for malware we have researched
☆11Updated last year
Alternatives and similar repositories for malware-ioc:
Users that are interested in malware-ioc are comparing it to the libraries listed below
- Discover potential timestamps within the Windows Registry☆18Updated 10 years ago
- Collection of single use scripts I worte for windows forensics☆27Updated 13 years ago
- Simple Bash script to retrieve basic system information.☆30Updated 6 years ago
- Artefacts from various retefe campaigns☆10Updated 5 years ago
- A reconnaissance tool that can quickly discover hostnames from a list of IP addresses.☆38Updated 14 years ago
- Repository for the OWASP/WASC Distributed Web Honeypots Project -☆29Updated 9 years ago
- Megatron - A System for Abuse- and Incident Handling☆42Updated 7 years ago
- My personal experience in Threat Hunting and knowledge gained so far.☆19Updated 7 years ago
- Quick & dirty script to get info on a file from online resources (VirusTotal, Team Cymru, Shadow Server etc.)☆30Updated 10 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- Mapping of Binaries that allows Arbitrary Code Execution☆23Updated 6 years ago
- Build Automated Machine Images for MISP☆28Updated last year
- An automated collection and analysis of malware from my honeypots.☆25Updated 7 years ago
- Empire (https://github.com/EmpireProject/Empire) dockerized☆10Updated 6 years ago
- Plugins to add funtionality to ProcDOT. http://www.procdot.com☆23Updated last year
- Metadata Inspection Database Alerting System☆42Updated 11 years ago
- DNS Enumeration and Reconnaissance Tool☆37Updated 9 years ago
- The ModSecurity Pcap Connector☆26Updated 9 years ago
- Yara Scanner For IMAP Feeds and saved Streams☆28Updated 5 years ago
- Bash scripts to help setup port redirects with iptables☆16Updated 7 years ago
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Updated 9 years ago
- Ansible Playbook for setting up Datasploit☆14Updated 8 years ago
- This repository is a curated list of pro bono incident response entities.☆20Updated last year
- A configurable OS shell command injection vulnerability testbed☆15Updated 11 years ago
- My Quick Note of BlackHat 2015 Arsenal☆27Updated 9 years ago
- Multiple rules for yara-project for detect compiler/packer/protector☆33Updated 5 years ago
- Proof-of-concept that makes a guess at what applications are being tunneled through an SSH session. It works primarily by analyzing packe…☆10Updated 11 years ago
- Cross Distribution Exploit Testing☆27Updated 9 years ago
- Using osquery for Mass Incident Detection & Response☆19Updated 8 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆22Updated 10 years ago