Collection of malware ioc hashes from blog posts. A Python script is provided to search through it.
☆19Sep 10, 2020Updated 5 years ago
Alternatives and similar repositories for malware-ioc-hash
Users that are interested in malware-ioc-hash are comparing it to the libraries listed below
Sorting:
- ☆537Feb 26, 2026Updated last week
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Jan 14, 2021Updated 5 years ago
- An informational repo about hunting for adversaries in your IT environment.☆14Apr 10, 2017Updated 8 years ago
- Resources About Persistence, Multiple Platforms. Including ~80 Tools and 300+ Posts.☆106Jun 1, 2020Updated 5 years ago
- moved to: https://github.com/alphaSeclab/awesome-reverse-engineering☆21Nov 25, 2019Updated 6 years ago
- Threat intelligence and threat detection indicators (IOC, IOA)☆52Nov 27, 2020Updated 5 years ago
- ☆58Aug 31, 2018Updated 7 years ago
- All Security Resource Collections Repos That I Published.☆128Jun 11, 2020Updated 5 years ago
- The "Let's-defend-solution" directory contains the answers to all paths of the Let's Defend platform that were saved by the creator 8 mon…☆12Apr 27, 2023Updated 2 years ago
- scripts☆10Aug 25, 2023Updated 2 years ago
- Informações extras referentes ao Treinamento Novo Pentest Profissional - https://desecsecurity.com/novo-pentest-profissional☆15May 13, 2023Updated 2 years ago
- ☆33Oct 16, 2025Updated 4 months ago
- Hardware specifications and schematics for the Worldcoin Orb.☆10Jul 18, 2023Updated 2 years ago
- Mitre ATT&CK and Suricata Rules Automation with AI & LLM☆14Sep 28, 2024Updated last year
- c4mund0n60 is a tool that use output of known tools for generate smart information about a domain☆11Sep 20, 2023Updated 2 years ago
- ☆10Aug 23, 2023Updated 2 years ago
- Web interface to IntelMQ☆10Sep 10, 2025Updated 5 months ago
- black Ip lists, dorks-collection☆16Updated this week
- ☆10Dec 5, 2017Updated 8 years ago
- Compiling a list of free learning resources in different areas of tech☆13Jul 19, 2023Updated 2 years ago
- Ransomware Detection Test PowerShell Script☆11Sep 22, 2017Updated 8 years ago
- ☆12Aug 15, 2024Updated last year
- USENIX 2023 Artifacts☆11Nov 25, 2022Updated 3 years ago
- Repository for the Oulu University Security Engineering course.☆14Sep 12, 2025Updated 5 months ago
- Cipher Suite Checker☆12Mar 22, 2023Updated 2 years ago
- Burp extension to fuzz/brute force GenAI/LLM prompts for potential behvioural and Prompt Injection vulnerabilities.☆13Sep 3, 2025Updated 6 months ago
- 2020年发布到阿尔法实验室微信公众号的所有安全资讯汇总☆40Jan 11, 2021Updated 5 years ago
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆102Jul 10, 2025Updated 7 months ago
- This python program gets all the saved passwords, credit cards and bookmarks from chromium based browsers supports chromium 80 and above!☆11Aug 27, 2022Updated 3 years ago
- MITM to Capture FTP Credentials☆14Apr 27, 2022Updated 3 years ago
- Training for Golang (go language)☆10Mar 29, 2019Updated 6 years ago
- A Model Context Protocol (MCP) server implementation that provides file backup and restoration capabilities☆12Aug 8, 2025Updated 6 months ago
- Automation Framework has many tools commonly used for Network Automation☆10Sep 4, 2025Updated 6 months ago
- Repository for integration with Apache Kafka☆14Jul 22, 2022Updated 3 years ago
- OSCP Prep notes☆14Oct 18, 2020Updated 5 years ago
- Transform EQL detection rules to VQL artifacts☆12Nov 12, 2021Updated 4 years ago
- siml is a CLI tool for discovering similar, related to, competitive, or alternative options to a given site.☆14Apr 30, 2023Updated 2 years ago
- The Kali NetHunter project is the first Open-source Android penetration testing platform for Android devices, allowing for access to the …☆11Sep 19, 2024Updated last year
- Pentester's toolbox☆12Jan 21, 2026Updated last month