JPCERTCC / Lucky-Visitor-Scam-IoCLinks
Automatically update IoC for lucky visitor scam
☆26Updated last month
Alternatives and similar repositories for Lucky-Visitor-Scam-IoC
Users that are interested in Lucky-Visitor-Scam-IoC are comparing it to the libraries listed below
Sorting:
- ☆22Updated 7 months ago
- Surface Analysis System on Cloud☆19Updated last year
- Script to test NetSec capabilities.☆21Updated 2 years ago
- RustyBlue is a rust implementation of DeepblueCLI, a forensics log analyzer for finding evidence of compromise from windows event logs.☆72Updated 2 years ago
- Core A2P2V functionality (command line based)☆68Updated last year
- 👻 [PoC] CSV+ 0.8.0 - Arbitrary Code Execution (CVE-2022-21241)☆24Updated 3 years ago
- CDIR Analyzer - parsers for data collected by CDIR Collector☆18Updated last year
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆19Updated last year
- Sniffing out well-known threat groups☆28Updated 9 months ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated 2 years ago
- ETW forensic tool for Volatility3 plugin☆15Updated 6 months ago
- BlueBox Malware analysis Box and Cyber threat intelligence.☆42Updated 3 years ago
- Collection of generic YARA rules☆16Updated 11 months ago
- ☆32Updated 2 years ago
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆26Updated 2 years ago
- External telegram feeder for AIL framework☆13Updated last month
- CIS Benchmark testing of Windows SIEM configuration☆44Updated 2 years ago
- ☆42Updated last year
- ☆42Updated 2 months ago
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆58Updated 4 months ago
- Assist analyst and threat hunters to understand Windows authentication logs and to analyze brutforce scenarios.☆18Updated last year
- Threat Hunt Investigation Methodology and Procedure☆15Updated 2 years ago
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Updated 2 years ago
- An extension of the sigma standard to include security metrics.☆15Updated 2 years ago
- ☆20Updated 2 years ago
- ☆24Updated 2 years ago
- A collection of Script for Red Team & Incidence Response☆11Updated 2 years ago
- ☆11Updated last year
- Slides and materials from conference presentations☆9Updated last year
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆52Updated last year