Citizen Lab Malware Reports
☆277Oct 4, 2020Updated 5 years ago
Alternatives and similar repositories for malware-indicators
Users that are interested in malware-indicators are comparing it to the libraries listed below
Sorting:
- Yara rules for malware families seen as part of targeted threats project☆141Nov 17, 2016Updated 9 years ago
- Collection of data about URL filtering in various countries☆44Sep 21, 2016Updated 9 years ago
- The Suspicious Email Submitter is a discontinued browser extension (Chrome, Chromium, Firefox) for the easy submission of suspicious emai…☆15Mar 6, 2023Updated 2 years ago
- Indicators from Unit 42 Public Reports☆728Aug 17, 2025Updated 6 months ago
- Ponmocup Indicators of Compromise☆11Feb 4, 2016Updated 10 years ago
- Indicators of Compromises (IOC) of our various investigations☆1,922Feb 20, 2026Updated last week
- a collection of public yara rules☆25Oct 30, 2019Updated 6 years ago
- IOC (Indicator of Compromise) Extractor: a program to help extract IOCs from text files.☆135Jan 14, 2016Updated 10 years ago
- Documents pertaining to internal policies and guidelines☆12Jan 20, 2017Updated 9 years ago
- Collection of IOCs related to targeting of civil society☆189Nov 11, 2021Updated 4 years ago
- Python libary to normalize Yara signatures☆19Oct 9, 2020Updated 5 years ago
- FireEye Publicly Shared Indicators of Compromise (IOCs)☆473Jan 19, 2019Updated 7 years ago
- APTnotes data☆1,773Dec 16, 2024Updated last year
- My Yara Rules Collection☆52Feb 7, 2016Updated 10 years ago
- YARA signature and IOC database for my scanners and tools☆2,874Feb 5, 2026Updated 3 weeks ago
- Multiple rules for yara-project for detect compiler/packer/protector☆33Dec 24, 2019Updated 6 years ago
- ☆36Feb 2, 2015Updated 11 years ago
- A repository to share contributions related to TheHive Project☆22Sep 15, 2021Updated 4 years ago
- Tool to extract indicators of compromise from security reports in PDF format☆439Feb 24, 2023Updated 3 years ago
- Investigation data from two reports around the Blue Coat networking kit.☆17Apr 15, 2014Updated 11 years ago
- BTG's purpose is to make fast and efficient search on IOC☆71Nov 27, 2018Updated 7 years ago
- ☆207May 3, 2023Updated 2 years ago
- A collection of sources of indicators of compromise.☆953May 8, 2025Updated 9 months ago
- Personal compilation of APT malware from whitepaper releases, documents and own research☆265Feb 7, 2019Updated 7 years ago
- yara rules for cryptography detection☆31Apr 28, 2014Updated 11 years ago
- Baseline organizational policies and practices☆10Apr 17, 2017Updated 8 years ago
- Yaras Random☆24Feb 21, 2019Updated 7 years ago
- Artifact analysis tools by JPCERT/CC Analysis Center☆462Aug 14, 2025Updated 6 months ago
- Malware Configuration And Payload Extraction☆761Nov 22, 2024Updated last year
- Repository of yara rules☆4,722Apr 17, 2024Updated last year
- REST API based malware repository (abandoned)☆107Apr 4, 2015Updated 10 years ago
- Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups☆723Dec 26, 2022Updated 3 years ago
- Malice Yara Plugin☆30Sep 8, 2019Updated 6 years ago
- Just another tool to extract Indicator of compromise (ioc) from files☆29Oct 1, 2015Updated 10 years ago
- CRITs - Collaborative Research Into Threats☆910Jul 29, 2019Updated 6 years ago
- Simple Distributed IOC Scanner☆12Jul 27, 2015Updated 10 years ago
- Python-based cloud node for local use☆11Mar 7, 2018Updated 7 years ago
- The repository contains IOCs in CSV format for APT, Cyber Crimes, Malware and Trojan and whatever I found as part of hunting and research☆12Jun 10, 2017Updated 8 years ago
- Extracts indicators of compromise (IOCs), including domain names, IPv4 addresses, email addresses, and hashes, from text.☆11Dec 10, 2017Updated 8 years ago