avast / iocLinks
Threat Intel IoCs + bits and pieces of dark matter
☆419Updated 4 months ago
Alternatives and similar repositories for ioc
Users that are interested in ioc are comparing it to the libraries listed below
Sorting:
- ☆554Updated last year
- ☆513Updated last year
- Sophos-originated indicators-of-compromise from published reports☆633Updated 2 months ago
- Automatically created C2 Feeds☆652Updated this week
- Repository of YARA rules made by Trellix ATR Team☆614Updated 7 months ago
- Signatures and IoCs from public Volexity blog posts.☆359Updated 2 weeks ago
- A collection of YARA rules we wish to share with the world, most probably referenced from http://blog.inquest.net.☆385Updated 3 years ago
- PCAP Samples for Different Post Exploitation Techniques☆366Updated 4 years ago
- Detection in the form of Yara, Snort and ClamAV signatures.☆237Updated 11 months ago
- Code and yara rules to detect and analyze Cobalt Strike☆271Updated 4 years ago
- ☆131Updated last year
- ReversingLabs YARA Rules☆867Updated 2 weeks ago
- Elastic Security detection content for Endpoint☆1,306Updated last week
- A standalone SIGMA-based detection tool for EVTX, Auditd and Sysmon for Linux logs☆747Updated 6 months ago
- Live forensic artifacts collector☆172Updated last year
- Lnk Explorer Command line edition!!☆328Updated 9 months ago
- Standard collection of rules for capa: the tool for enumerating the capabilities of programs☆641Updated last week
- ☆145Updated last week
- Open Source EDR for Windows☆1,279Updated 2 years ago
- Set of EVTX samples (>270) mapped to MITRE ATT&CK tactic and techniques to measure your SIEM coverage or developed new use cases.☆592Updated 9 months ago
- Indicators from Unit 42 Public Reports☆725Updated 2 months ago
- Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups☆717Updated 2 years ago
- IOC from articles, tweets for archives☆319Updated last year
- Beta versions of my software☆264Updated 4 months ago
- Arya is a unique tool that produces pseudo-malicious files meant to trigger YARA rules. You can think of it like a reverse YARA.☆259Updated 2 years ago
- Volatility plugin for extracts configuration data of known malware☆493Updated last year
- Sigma rules from Joe Security☆224Updated 11 months ago
- ☆195Updated last year
- A collection of red team and adversary emulation resources developed and released by MITRE.☆522Updated 4 years ago
- ☆1,112Updated last year