Zimperium / IOCLinks
IOCs from zLabs research
☆34Updated 2 weeks ago
Alternatives and similar repositories for IOC
Users that are interested in IOC are comparing it to the libraries listed below
Sorting:
- It was developed to speed up the processes of SOC Analysts during analysis☆47Updated last year
- Python-based web scraper for a darkweb marketplace on the Tor network.☆37Updated last year
- Tor onion address lookup☆58Updated 4 months ago
- If you a security engineer or an aspirant Security professional then Setting up a Wazuh home lab environment is an excellent way for SOC …☆15Updated last year
- information about ransomware groups (Ransomware Analysis Notes)☆40Updated 2 years ago
- Real Android malware apps discussed in the book☆44Updated 2 years ago
- Capture screenshots of onion services on an onion service.☆72Updated last year
- Detection for CVE-2025-61882 & CVE-2025-61884☆37Updated 2 months ago
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆31Updated last year
- An intentionally vulnerable Android Application to demonstrate various vulnerabilities that airses in Android Components.☆39Updated 8 months ago
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆28Updated last year
- OSINT tool for username, email and domains☆29Updated last year
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆42Updated last year
- This Python-based GUI application allows you to track the latest security vulnerabilities (CVEs) using the☆39Updated 8 months ago
- Collection of my Security Blueprints & Guides☆51Updated 2 months ago
- hiding in plain sight: part 2☆45Updated last year
- A repository preserving darknet market data, including vendor lists, PGP keys, listings, and more for research & intelligence purposes.☆50Updated 6 months ago
- A comprehensive web application security testing toolkit that combines 10 powerful penetration testing features into one tool.☆43Updated 8 months ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆69Updated 2 years ago
- Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability remotely☆75Updated last year
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts☆125Updated last week
- ☆19Updated 2 years ago
- Simple Imager has been created for performing live acquisition of Windows based systems in a forensically sound manner☆30Updated 2 months ago
- Over 100K open-source YARA signatures evaluated against over 280K files to give insights into the performance of each YARA rule.☆26Updated 3 years ago
- ☆34Updated last year
- A tool for generating detailed, locally-processed reports from iOS backups, supporting encrypted and unencrypted data.☆61Updated last year
- Shortemall is a Python-based tool that automates the process of scanning hidden content of Short URLs.☆90Updated last year
- Mobile Reconnaissance Framework is a powerful, lightweight and platform-independent offensive mobile security tool designed to help hacke…☆76Updated last month
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆54Updated last year
- A collection of Script for Red Team & Incidence Response☆11Updated 3 years ago