JPCERTCC / Lucky-Visitor-Scam-IoC
Automatically update IoC for lucky visitor scam
☆26Updated 2 weeks ago
Alternatives and similar repositories for Lucky-Visitor-Scam-IoC:
Users that are interested in Lucky-Visitor-Scam-IoC are comparing it to the libraries listed below
- ☆11Updated last year
- CDIR Analyzer - parsers for data collected by CDIR Collector☆18Updated last year
- Surface Analysis System on Cloud☆19Updated last year
- ☆22Updated 6 months ago
- Threat Hunt Investigation Methodology and Procedure☆15Updated 2 years ago
- 👻 [PoC] CSV+ 0.8.0 - Arbitrary Code Execution (CVE-2022-21241)☆24Updated 3 years ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated 2 years ago
- ETW forensic tool for Volatility3 plugin☆13Updated 5 months ago
- Virus Total Free - IOC parser and report generator☆23Updated 2 years ago
- External telegram feeder for AIL framework☆13Updated 2 months ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 3 years ago
- Lazarus analysis tools and research report☆56Updated last year
- Hundred Days of Yara Challenge☆12Updated 2 years ago
- Sniffing out well-known threat groups☆28Updated 8 months ago
- Collection of generic YARA rules☆16Updated 10 months ago
- ☆32Updated 2 years ago
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆51Updated last year
- RustyBlue is a rust implementation of DeepblueCLI, a forensics log analyzer for finding evidence of compromise from windows event logs.☆72Updated 2 years ago
- Hive v5 file decryption algorithm☆34Updated 2 years ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆60Updated 2 years ago
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆26Updated 2 years ago
- This script is to build Wazuh 4.3 environment☆12Updated 2 years ago
- Repository for archiving Cobalt Strike configuration☆29Updated this week
- Script to test NetSec capabilities.☆21Updated last year
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Updated 2 years ago
- Lightweight Python-Based Malware Analysis Pipeline☆34Updated 2 weeks ago
- Active DIrectory Lab for Pentesting Practice☆24Updated 2 years ago
- Memory Forensic System on Cloud☆90Updated last year
- Method of finding interesting domains using keywords + JARMs☆13Updated 2 years ago
- This Repository gives the best and possible strategies against hunting the ransomware☆26Updated 2 years ago