This is the repository for indicators of compromise (IOCs) and other data for threat intelligence articles posted on the Palo Alto Networks Unit 42 website.
☆116Nov 17, 2025Updated 5 months ago
Alternatives and similar repositories for Unit42-Threat-Intelligence-Article-Information
Users that are interested in Unit42-Threat-Intelligence-Article-Information are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Indicators of compromise☆17Jan 29, 2026Updated 2 months ago
- single-threaded event driven sleep obfuscation poc for linux☆38Jun 14, 2025Updated 10 months ago
- A collection of files with indicators supporting social media posts from Palo Alto Network's Unit 42 team to disseminate timely threat in…☆490Apr 8, 2026Updated last week
- Static-Code-Analysis-Helper helps you perform static code analysis.☆32Feb 20, 2026Updated last month
- this repository made to help me All Dorking repositories find for one location☆36Aug 31, 2025Updated 7 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Port of Mandiant ShellcodeHashes plugin from IDA to BinaryNinja☆11Jul 24, 2024Updated last year
- Repo that hold write-ups of various research projects I did and/or overall InfoSec things I investigated/researched.☆22Jan 5, 2025Updated last year
- Windows User-Mode Shellcode Development Framework (WUMSDF)☆130Nov 17, 2025Updated 5 months ago
- a repo for utilizing a base64 like encoding scheme + AES Encryption using Emojis☆13Mar 16, 2025Updated last year
- ☆15Sep 17, 2022Updated 3 years ago
- Pinjectra is a C/C++ OOP-like library that implements Process Injection techniques (with focus on Windows 10 64-bit)☆16Sep 4, 2020Updated 5 years ago
- ☆12Aug 16, 2024Updated last year
- Different tools for Microsoft Hyper-V researching☆73Mar 25, 2026Updated 3 weeks ago
- Vectored Exception Handling Squared☆30Dec 27, 2025Updated 3 months ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Plugin for NOPing instructions in IDA☆21May 9, 2024Updated last year
- A Model Context Protocol (MCP) server that integrates Volatility 3 memory forensics framework with Claude☆35Jul 7, 2025Updated 9 months ago
- ☆22Jan 31, 2023Updated 3 years ago
- Repository where I hold random detection and threat hunting queries that I come up with based on different sources of information (or eve…☆280Dec 20, 2025Updated 3 months ago
- ☆32Dec 10, 2024Updated last year
- ☆16Sep 5, 2024Updated last year
- A few STUXNET samples and live traffic captures from July 2010 while many stuxnet implants were still operational.☆29Sep 17, 2024Updated last year
- Command and Control Framework using powershell implants☆36Jun 17, 2025Updated 10 months ago
- System Call Integrity Layer - experimental security research☆25Updated this week
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- An experimental Velociraptor implementation using cloud infrastructure☆26Dec 2, 2025Updated 4 months ago
- ☆16May 22, 2024Updated last year
- Tool designed to exfiltrate OneDrive Business OCR Data☆126Jan 27, 2025Updated last year
- Config files for my GitHub profile.☆14May 7, 2023Updated 2 years ago
- example using NtCreateUserProcess in rust☆19Jan 20, 2025Updated last year
- A collection of open source threat detection rules created by Cyber Castle's team.☆14Jun 2, 2022Updated 3 years ago
- A repository of credential stealer formats☆252Jun 10, 2025Updated 10 months ago
- ☆13Dec 29, 2022Updated 3 years ago
- Scripts to decloak Linux Loadable Kernel Module (LKM) stealth rootkits.☆35Sep 28, 2025Updated 6 months ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Rapid7 Labs operates as the division of Rapid7 focused on threat research. It is renowned for providing comprehensive threat intelligence…☆98Apr 7, 2026Updated last week
- ☆24Mar 12, 2025Updated last year
- Baseline a Windows System against LOLBAS☆73Feb 2, 2026Updated 2 months ago
- ☆57Aug 28, 2023Updated 2 years ago
- Diaphora Machine Learning tools and datasets☆23Sep 23, 2024Updated last year
- A resource containing all the tools each ransomware gangs uses☆1,344Apr 1, 2026Updated 2 weeks ago
- Search an entire directory of .eml email files for a word or phrase... in over 100 languages.☆12Feb 28, 2023Updated 3 years ago