☆17Jan 22, 2026Updated last month
Alternatives and similar repositories for iocs
Users that are interested in iocs are comparing it to the libraries listed below
Sorting:
- Cyber Threats Detection Rules☆14Sep 16, 2025Updated 5 months ago
- Alternative password shadowing scheme☆10Feb 22, 2026Updated last week
- This directory contains random scripts from threat hunting or malware research☆11Feb 15, 2018Updated 8 years ago
- A hands-on workshop to learn how to do threat detection and response in AWS.☆11Sep 13, 2021Updated 4 years ago
- Threat intelligence and threat detection indicators (IOC, IOA)☆52Nov 27, 2020Updated 5 years ago
- Threat Detection System using Hybrid (Machine Learning + Lexical Analysis) learning Approach.☆11May 30, 2017Updated 8 years ago
- Yaralyze is an malware detection tool for Android that relies on two types of static analysis, Yara rule analysis and hashes analysis.☆21Nov 13, 2022Updated 3 years ago
- 威胁检测规则集☆15Jul 5, 2019Updated 6 years ago
- Indicators of compromise☆17Jan 29, 2026Updated last month
- An open source, cloud native toolkit for threat detection and mitigation☆19Mar 30, 2020Updated 5 years ago
- Insider Threat Detection using Isolation Forest☆17Jun 1, 2018Updated 7 years ago
- ☆21May 19, 2016Updated 9 years ago
- ☆21Apr 19, 2024Updated last year
- A collection of curated YARA rules used as part of the Filescan.io service☆22Feb 18, 2026Updated last week
- Web based S1 query navigator for one-click threat hunting☆25Dec 18, 2020Updated 5 years ago
- Advanced Persistent Threat Detection Using Network Analysis☆23Feb 28, 2019Updated 7 years ago
- A curated list of resources to deep dive into the intersection of applied machine learning and threat detection.☆19Sep 23, 2020Updated 5 years ago
- THOR Thunderstorm Collectors☆25Updated this week
- We, Achin and Harekrissna worked as a team to complete the project given to us on Buried threat detection using ground penetrating radar.…☆24Jan 28, 2020Updated 6 years ago
- Rapid7 Labs operates as the division of Rapid7 focused on threat research. It is renowned for providing comprehensive threat intelligence…☆77Dec 15, 2025Updated 2 months ago
- Snort_rules detection bad actors.☆29Aug 18, 2024Updated last year
- This repository contains the research and components of our research into using Sigma for AWS Incident Response.☆31Jul 12, 2023Updated 2 years ago
- ☆11Feb 9, 2023Updated 3 years ago
- ☆29May 1, 2020Updated 5 years ago
- ☆31Feb 28, 2025Updated last year
- Community content for LogRhythm Axon. Includes Dashboards, searches, analytics rules, processing policies and more.☆10Jul 26, 2024Updated last year
- A collection of my yara rules☆34Jul 11, 2023Updated 2 years ago
- Hatching Triage public command-line utility and API library.☆74Oct 9, 2023Updated 2 years ago
- Yara Rules for Modern Malware☆78Mar 3, 2024Updated last year
- Indicators of Compromise☆258Feb 9, 2026Updated 2 weeks ago
- ☆37Sep 30, 2021Updated 4 years ago
- Azure Deployment Templates for Mandiant Managed Huning☆12Jun 1, 2023Updated 2 years ago
- 🌌 Real-time threat detection for smart contracts☆10May 16, 2023Updated 2 years ago
- find movie on yts from IMDB's watchlist☆12Jul 5, 2021Updated 4 years ago
- ETHICAL-HACKING☆12Dec 20, 2023Updated 2 years ago
- ☆78Sep 29, 2025Updated 5 months ago
- Advanced threat detection solution for Linux.☆36Dec 5, 2020Updated 5 years ago
- Tool to extract Sessions, MessageID(s) and find the emails belonging to MessageID(s). This script utilizes the MailItemsAccessed features…☆41Oct 20, 2020Updated 5 years ago
- Repository with selected IOCs and YARA rules for threat hunting.☆35May 21, 2025Updated 9 months ago