GoSecure / malware-ioc
Indicators of Compromise (IOCs) for malware we have researched
☆11Updated last year
Alternatives and similar repositories for malware-ioc:
Users that are interested in malware-ioc are comparing it to the libraries listed below
- Artefacts from various retefe campaigns☆10Updated 6 years ago
- Honeybrid is a network application built to 1) administrate network of honeypots, and 2) transparently redirect live network sessions (TC…☆31Updated 6 years ago
- Multiple rules for yara-project for detect compiler/packer/protector☆33Updated 5 years ago
- Discover potential timestamps within the Windows Registry☆18Updated 11 years ago
- A short and small memory forensics helper.☆52Updated 7 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆43Updated 7 years ago
- Metadata Inspection Database Alerting System☆42Updated 11 years ago
- A reconnaissance tool that can quickly discover hostnames from a list of IP addresses.☆38Updated 14 years ago
- A simple command-line script to interact with the virustotal-api☆61Updated 7 years ago
- Quick & dirty script to get info on a file from online resources (VirusTotal, Team Cymru, Shadow Server etc.)☆30Updated 10 years ago
- tracy - a system call tracer and injector. Find us in #tracy on irc.freenode.net☆33Updated last year
- Yara syntax highlighting☆25Updated 3 years ago
- Rekall Forensics and Incident Response Framework with rVMI extensions☆33Updated 4 years ago
- YAPDNS☆39Updated 9 years ago
- post-exploitation tools☆15Updated 7 years ago
- ☆68Updated 7 years ago
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆57Updated 10 years ago
- Simple Bash script to retrieve basic system information.☆30Updated 7 years ago
- Yara Scanner For IMAP Feeds and saved Streams☆28Updated 5 years ago
- A tool designed for consistent and safe capture of off network web resources.☆37Updated 8 years ago
- Metasploit exploit suggester using OpenVAS XML output☆18Updated 6 years ago
- This repository is a curated list of pro bono incident response entities.☆20Updated last year
- Membrane: A Posteriori Detection of Malicious Code Loading by Memory Paging Analysis☆42Updated 8 years ago
- Unpack MIME attachments from a file and check them against virustotal.com☆44Updated 9 years ago
- Automated Memory Forensic☆35Updated 6 years ago
- Repository for the OWASP/WASC Distributed Web Honeypots Project -☆31Updated 10 years ago
- REST API based malware repository (abandoned)☆108Updated 10 years ago
- My personal experience in Threat Hunting and knowledge gained so far.☆19Updated 7 years ago
- Using osquery for Mass Incident Detection & Response☆19Updated 8 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Updated 11 years ago