blacklotuslabs / IOCsLinks
IOCs published by Black Lotus Labs
☆124Updated 2 months ago
Alternatives and similar repositories for IOCs
Users that are interested in IOCs are comparing it to the libraries listed below
Sorting:
- Rules Shared by the Community from 100 Days of YARA 2023☆78Updated 2 years ago
- ☆96Updated 7 months ago
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆119Updated 2 years ago
- A python script developed to process Windows memory images based on triage type.☆265Updated 2 years ago
- This repository is for Indicators of Compromise (IOCs) from Zscaler ThreatLabz public reports☆75Updated 2 weeks ago
- Fast IOC and YARA Scanner☆87Updated 5 years ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆147Updated 2 years ago
- Russia / Ukraine 2022 conflict related IOCs from CERT Orange Cyberdefense Threat Intelligence Datalake☆175Updated 3 years ago
- A toolkit for the post-mortem examination of Docker containers from forensic HDD copies☆106Updated last year
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆87Updated 3 years ago
- Welcome to the SEKOIA.IO Community repository!☆172Updated this week
- ☆77Updated 3 months ago
- firedrill is a malware simulation harness for evaluating your security controls☆195Updated last year
- ☆131Updated last year
- A Cobalt Strike Scanner that retrieves detected Team Server beacons into a JSON object☆170Updated 3 years ago
- YaraScanner is a file pattern-matching tool based on YARA rules.☆60Updated 2 years ago
- Open IOC sharing platform☆65Updated last year
- ☆195Updated last year
- Artifact collection tool for *nix systems☆213Updated last year
- ☆149Updated 2 months ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆66Updated 3 years ago
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆208Updated 3 years ago
- Collect-MemoryDump - Automated Creation of Windows Memory Snapshots for DFIR☆252Updated 2 months ago
- A collection of intelligence about Log4Shell and its exploitation activity.☆184Updated 3 years ago
- Blueteam operational triage registry hunting/forensic tool.☆150Updated 3 months ago
- A GUI to query the API of abuse.ch.☆70Updated 3 years ago
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆154Updated 3 years ago
- ☆212Updated 6 months ago
- Open Threat Hunting Framework☆121Updated 2 years ago
- Indicators of Compromise☆246Updated 2 weeks ago