HarfangLab / iocsLinks
Indicators of compromise
☆16Updated 2 months ago
Alternatives and similar repositories for iocs
Users that are interested in iocs are comparing it to the libraries listed below
Sorting:
- Rapid7 Labs operates as the division of Rapid7 focused on threat research. It is renowned for providing comprehensive threat intelligence…☆75Updated last month
- Contains compiled binaries of Volatility☆37Updated 8 months ago
- ☆22Updated 2 years ago
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆85Updated last month
- ☆28Updated 3 months ago
- A Windows Event Log MCP☆38Updated 5 months ago
- ShellSweeping the evil.☆53Updated last year
- Tools and scripts to deploy and manage OpenRelik instances☆16Updated 7 months ago
- Yara Rules for Modern Malware☆78Updated last year
- Turn any blog into structured threat intelligence.☆49Updated this week
- Detection rule validation☆40Updated 2 years ago
- Repo that hold write-ups of various research projects I did and/or overall InfoSec things I investigated/researched.☆21Updated last year
- ☆53Updated last week
- ☆46Updated last week
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆34Updated 7 months ago
- CarbonBlack EDR detection rules and response actions☆73Updated last year
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆54Updated last year
- Quick ESXi Log Parser☆28Updated 3 months ago
- TIM is a Kusto investigation platform that enables a user to quickly pivot between data sources; annotate their findings; and promotes co…☆23Updated last year
- ☆17Updated this week
- USN Journal full path builder☆65Updated last year
- Placeholder for my detection repo and misc detection engineering content☆42Updated 2 years ago
- Python based tool to extract forensic info from EventTranscript.db (Windows Diagnostic Data)☆68Updated 2 years ago
- Sigma detection rules for hunting with the threathunting-keywords project☆57Updated 10 months ago
- A home for detection content developed by the delivr.to team☆73Updated 5 months ago
- A powerful macOS triage collection tool designed for forensic analysis. It gathers critical system artifacts such as FSEvents, Spotlight,…☆31Updated 3 months ago
- ESXi Cyber Security Incident Response Script☆25Updated last year
- Helping Incident Responders hunt for potential persistence mechanisms on UNIX-based systems.☆17Updated 2 years ago
- Living off the False Positive!☆41Updated 11 months ago
- Detection Engineering with YARA☆86Updated 2 years ago