advanced-threat-research / IOCs
Repository containing IOCs, CSV and MISP JSON from our blogs
☆78Updated 3 years ago
Alternatives and similar repositories for IOCs:
Users that are interested in IOCs are comparing it to the libraries listed below
- A Yara rule generator for finding related samples and hunting☆158Updated 2 years ago
- A mapping of used malware names to commonly known family names☆62Updated last year
- This script scans the files extracted by Zeek with YARA rules located on the rules folder on a Linux based Zeek sensor, if there is a mat…☆61Updated last year
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆98Updated last month
- Personal compilation of APT malware from whitepaper releases, documents and own research☆259Updated 6 years ago
- Community modules for FAME☆65Updated 2 weeks ago
- Random hunting ordiented yara rules☆95Updated last year
- Log Entry to Sigma Rule Converter☆107Updated 2 years ago
- An Inofficial Sysmon Version History (Change Log)☆32Updated 4 years ago
- A tool to assess data quality, built on top of the awesome OSSEM.☆76Updated 2 years ago
- Python IOC Editor☆62Updated 9 years ago
- Proofpoint - Emerging Threats - Threat Research tools + publicly shared intel and documentation☆72Updated last month
- Yara-Endpoint is a tool useful for incident response as well as anti-malware enpoint base on Yara signatures.☆105Updated 6 years ago
- A lightweight tool to load Windows Event Log evtx files into Elasticsearch.☆115Updated 4 years ago
- S2AN - Mapper of Sigma/Suricata Rules/Signatures ➡️ MITRE ATT&CK Navigator☆85Updated 2 years ago
- ☆33Updated 4 years ago
- YARA rule metadata specification and validation utility / Spécification et validation pour les règles YARA☆99Updated this week
- A Splunk app to use MISP in background☆109Updated this week
- Threat Alert Logic Repository☆92Updated 6 years ago
- IOC (Indicator of Compromise) Extractor: a program to help extract IOCs from text files.☆135Updated 9 years ago
- Sigma Detection Rule Repository☆86Updated 4 years ago
- Mapping NSM rules to MITRE ATT&CK☆69Updated 4 years ago
- Research indicators and detection rules☆66Updated last year
- Tool to extract indicators of compromise from security reports in PDF format☆72Updated 7 months ago
- Collection of useful, up to date, Carbon Black Response Queries☆83Updated 4 years ago
- A YARA Rule Performance Measurement Tool☆58Updated 11 months ago
- ☆125Updated last week
- Definition, description and relationship types of MISP objects☆94Updated this week
- This tool maps a file's behavior on MITRE ATT&CK matrix.☆57Updated 4 years ago
- A repo to document API functions mapped to security events across diverse platforms☆75Updated 5 years ago