Defanged Indicator of Compromise (IOC) Extractor.
☆569Aug 28, 2024Updated last year
Alternatives and similar repositories for iocextract
Users that are interested in iocextract are comparing it to the libraries listed below
Sorting:
- Extract and aggregate threat intelligence.☆908Jan 31, 2024Updated 2 years ago
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆103Jul 10, 2025Updated 8 months ago
- Tool to extract indicators of compromise from security reports in PDF format☆439Feb 24, 2023Updated 3 years ago
- Simple, effective, and modular package for parsing observables (indicators of compromise (IOCs), network data, and other, security relate…☆179Updated this week
- Indicator Extractor☆141Jul 14, 2018Updated 7 years ago
- Indicators of Compromises (IOC) of our various investigations☆1,933Mar 10, 2026Updated last week
- Your Everyday Threat Intelligence☆1,959Updated this week
- A tool to extract structured cyber information from incident reports.☆82Aug 30, 2018Updated 7 years ago
- Fang and defang indicators of compromise. You can test this project in a GUI here: http://ioc-fanger.hightower.space .☆68Oct 2, 2023Updated 2 years ago
- A collection of sources of indicators of compromise.☆957May 8, 2025Updated 10 months ago
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Feb 6, 2024Updated 2 years ago
- A collection of YARA rules we wish to share with the world, most probably referenced from http://blog.inquest.net.☆388May 11, 2022Updated 3 years ago
- Hunting IOCs all day every day...☆88Sep 26, 2023Updated 2 years ago
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆62Mar 14, 2026Updated last week
- Malware/IOC ingestion and processing engine☆109Nov 20, 2018Updated 7 years ago
- A curated list of awesome YARA rules, tools, and people.☆4,163Updated this week
- YARA signature and IOC database for my scanners and tools☆2,884Mar 9, 2026Updated last week
- An open source framework for enterprise level automated analysis.☆394Jun 27, 2022Updated 3 years ago
- Minimal, consistent Python API for building integrations with malware sandboxes.☆142Jan 31, 2024Updated 2 years ago
- APT & CyberCriminal Campaign Collection☆4,046Jul 25, 2024Updated last year
- A toolset to make a system look as if it was the victim of an APT attack☆2,722Sep 23, 2025Updated 5 months ago
- AIL framework - Analysis Information Leak framework. Project moved to https://github.com/ail-project☆1,364Updated this week
- The GOSINT framework is a project used for collecting, processing, and exporting high quality indicators of compromise (IOCs).☆556May 9, 2023Updated 2 years ago
- IntelMQ is a solution for IT security teams for collecting and processing security feeds using a message queuing protocol.☆1,116Feb 14, 2026Updated last month
- IOC from articles, tweets for archives☆318Dec 12, 2023Updated 2 years ago
- Automatically created C2 Feeds☆667Updated this week
- Online hash checker for Virustotal and other services☆846Mar 21, 2025Updated last year
- CLI tool for open source and threat intelligence☆1,267Feb 27, 2025Updated last year
- ReversingLabs YARA Rules☆900Nov 3, 2025Updated 4 months ago
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,501Jan 12, 2026Updated 2 months ago
- YARA malware query accelerator (web frontend)☆437Feb 3, 2026Updated last month
- ☆14May 30, 2018Updated 7 years ago
- Django web interface for managing Yara rules☆196Jul 28, 2018Updated 7 years ago
- yarGen is a generator for YARA rules☆1,781Jan 10, 2026Updated 2 months ago
- IOC (Indicator of Compromise) Extractor: a program to help extract IOCs from text files.☆135Jan 14, 2016Updated 10 years ago
- Awesome VirusTotal Intelligence Search Queries☆333May 16, 2023Updated 2 years ago
- Repository of YARA rules made by Trellix ATR Team☆627Mar 18, 2025Updated last year
- A Yara rule generator for finding related samples and hunting☆162Sep 11, 2022Updated 3 years ago
- Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups☆723Dec 26, 2022Updated 3 years ago