blacklotuslabs / IOCsLinks
IOCs published by Black Lotus Labs
☆124Updated 2 months ago
Alternatives and similar repositories for IOCs
Users that are interested in IOCs are comparing it to the libraries listed below
Sorting:
- Fast IOC and YARA Scanner☆87Updated 5 years ago
- ☆77Updated 3 months ago
- ☆194Updated last year
- This repository is for Indicators of Compromise (IOCs) from Zscaler ThreatLabz public reports☆75Updated 3 weeks ago
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆120Updated 2 years ago
- Rules Shared by the Community from 100 Days of YARA 2023☆78Updated 2 years ago
- ☆150Updated 2 months ago
- ☆131Updated last year
- A toolkit for the post-mortem examination of Docker containers from forensic HDD copies☆106Updated last year
- ☆96Updated 7 months ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆148Updated 2 years ago
- A python script developed to process Windows memory images based on triage type.☆265Updated 2 years ago
- Forensic Artifact Collection Tool Matrix☆91Updated last year
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆87Updated 3 years ago
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆133Updated 3 years ago
- LOKI2 - Simple IOC and YARA Scanner☆109Updated 6 months ago
- ATT&CK Powered Suit is a browser extension that puts the complete MITRE ATT&CK® knowledge base at your fingertips with text search, conte…☆81Updated 6 months ago
- Signatures and IoCs from public Volexity blog posts.☆361Updated last month
- YaraScanner is a file pattern-matching tool based on YARA rules.☆60Updated 2 years ago
- Welcome to the SEKOIA.IO Community repository!☆172Updated this week
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆66Updated 3 years ago
- Automated YARA Rule Standardization and Quality Assurance Tool☆265Updated last week
- Blueteam operational triage registry hunting/forensic tool.☆150Updated 4 months ago
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆154Updated 3 years ago
- Collect-MemoryDump - Automated Creation of Windows Memory Snapshots for DFIR☆251Updated 2 months ago
- QuickSand document and PDF malware analysis tool written in Python☆134Updated 2 months ago
- YARA rule analyzer to improve rule quality and performance☆107Updated 8 months ago
- The Windows Malware Analysis Reversing Core Tools☆97Updated 5 years ago
- A guide on how to write fast and memory friendly YARA rules☆162Updated 10 months ago
- Digital Forensics Artifacts Knowledge Base☆88Updated last week