Zimperium / IOCLinks
IOCs from zLabs research
☆34Updated last month
Alternatives and similar repositories for IOC
Users that are interested in IOC are comparing it to the libraries listed below
Sorting:
- Real Android malware apps discussed in the book☆44Updated 2 years ago
- Collection of my Security Blueprints & Guides☆51Updated 3 months ago
- It was developed to speed up the processes of SOC Analysts during analysis☆47Updated last year
- Tor onion address lookup☆59Updated this week
- information about ransomware groups (Ransomware Analysis Notes)☆40Updated 2 years ago
- Capture screenshots of onion services on an onion service.☆73Updated last year
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆28Updated last year
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆31Updated last year
- A tool for generating detailed, locally-processed reports from iOS backups, supporting encrypted and unencrypted data.☆61Updated last year
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆62Updated 3 years ago
- This Python-based GUI application allows you to track the latest security vulnerabilities (CVEs) using the☆40Updated 9 months ago
- A collection of Malware Analysis software, materials, libraries, documents, books, resources about malware analysis in Cybersecurity.☆56Updated 2 years ago
- A YARA & Malware Analysis Toolkit written in Rust.☆89Updated 3 months ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆54Updated last year
- This project provides a set of Google Apps Scripts designed to help you identify and analyze potentially malicious domains directly from …☆14Updated last year
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆69Updated 2 years ago
- A meta-list of public references to threat actor profiles and APT group datasets.☆72Updated 3 months ago
- Shortemall is a Python-based tool that automates the process of scanning hidden content of Short URLs.☆90Updated last year
- C2 Active Scanner☆59Updated last year
- A curated list of awesome binary analysis automation training, resources, and tools.☆50Updated last year
- ARP Spoofing Defender is a project designed to protect local networks from ARP Spoofing attacks. ARP Spoofing Defender provides mechanism…☆23Updated last month
- APT hub, It help's research to collect information and data on the latest APT activities. It collects data on APT profiles, IOCs(1 yr), a…☆53Updated 10 months ago
- A machine learning malware analysis framework for Android apps.☆134Updated last year
- Data breaches, Leaks, Malwares Forums List <Please Use Vpn/TOR don't click on Link directly bad OPSEC>☆58Updated 3 months ago
- ☆63Updated 2 years ago
- Raw data from Threat Intelligence Reports with automatic reports collection and keyword search across thousands of reports☆145Updated this week
- An intentionally vulnerable Android Application to demonstrate various vulnerabilities that airses in Android Components.☆39Updated 9 months ago
- Mobile Reconnaissance Framework is a powerful, lightweight and platform-independent offensive mobile security tool designed to help hacke…☆77Updated last week
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆42Updated last year
- specialized investigative framework to investigate cases of malicious actors in the OSINT and backup dark forums.☆67Updated 5 months ago