A collection of intelligence about Log4Shell and its exploitation activity.
☆184Mar 4, 2022Updated 3 years ago
Alternatives and similar repositories for Log4Shell-IOCs
Users that are interested in Log4Shell-IOCs are comparing it to the libraries listed below
Sorting:
- ☆22Dec 22, 2020Updated 5 years ago
- ☆96May 5, 2025Updated 9 months ago
- IP addresses exploiting recent log4j2 vulnerability CVE-2021-44228☆16Dec 19, 2021Updated 4 years ago
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆118Dec 13, 2023Updated 2 years ago
- A MITRE ATT&CK Lookup Tool☆46Apr 25, 2024Updated last year
- Hashes for vulnerable LOG4J versions☆155Dec 17, 2021Updated 4 years ago
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆134Jan 31, 2022Updated 4 years ago
- IOC from articles, tweets for archives☆318Dec 12, 2023Updated 2 years ago
- Repository of public reference frameworks for the DFIR community.☆121Jul 4, 2023Updated 2 years ago
- Sophos-originated indicators-of-compromise from published reports☆653Jan 16, 2026Updated last month
- Threat Box Assessment Tool☆19Aug 15, 2021Updated 4 years ago
- The Threat Hunting In Rapid Iterations (THIRI) Jupyter notebook is designed as a research aide to let you rapidly prototype threat huntin…☆154Apr 25, 2022Updated 3 years ago
- A community sourced list of log4j-affected software☆1,124Nov 9, 2022Updated 3 years ago
- Indicators of Normality☆11Jul 22, 2022Updated 3 years ago
- ☆44Jul 11, 2025Updated 7 months ago
- Tools for hunting for threats.☆599Apr 30, 2025Updated 10 months ago
- ☆512Oct 7, 2024Updated last year
- An easy to use PowerShell script to collect memory and disk forensics for DFIR investigations.☆341Dec 3, 2025Updated 2 months ago
- Script to pull newly-registered domains and check for similarity against a provided word list.☆13Aug 2, 2020Updated 5 years ago
- ☆129Jan 29, 2024Updated 2 years ago
- #ThreatHunting #DFIR #Malware #Detection Mind Maps☆304Nov 13, 2021Updated 4 years ago
- ShellSweeping the evil.☆53Jun 18, 2024Updated last year
- Unpacking and decryption tools for the Emotet malware☆44Dec 5, 2021Updated 4 years ago
- BlackBerry Threat Research & Intelligence☆100Oct 20, 2023Updated 2 years ago
- Curated Intelligence is working with analysts from around the world to provide useful information to organisations in Ukraine looking for…☆935Jun 26, 2023Updated 2 years ago
- Detector for Log4Shell exploitation attempts☆726Feb 12, 2022Updated 4 years ago
- A YARA rules repository continuously updated for monitoring the old and new threats from articles, incidents responses ...☆141Nov 19, 2023Updated 2 years ago
- Operational information regarding the log4shell vulnerabilities in the Log4j logging library.☆1,889Jun 15, 2022Updated 3 years ago
- Generates YARA rules to detect malware using API hashing☆17Mar 16, 2021Updated 4 years ago
- Signatures and IoCs from public Volexity blog posts.☆363Dec 4, 2025Updated 2 months ago
- Malware similarity platform with modularity in mind.☆80Jul 18, 2021Updated 4 years ago
- Indicators from Unit 42 Public Reports☆728Aug 17, 2025Updated 6 months ago
- PCRE RegEx matching Log4Shell CVE-2021-44228 IOC in your logs☆293Dec 21, 2021Updated 4 years ago
- c2 traffic☆194Feb 6, 2023Updated 3 years ago
- A collection of tips for using MISP.☆76Dec 11, 2024Updated last year
- Russia / Ukraine 2022 conflict related IOCs from CERT Orange Cyberdefense Threat Intelligence Datalake☆174Dec 9, 2022Updated 3 years ago
- Bro PCAP Processing and Tagging API☆28Nov 9, 2017Updated 8 years ago
- Resources for DFIR Professionals Responding to the REvil Ransomware Kaseya Supply Chain Attack☆180Jul 6, 2021Updated 4 years ago
- All-in-one bundle of MISP, TheHive and Cortex☆169Sep 27, 2022Updated 3 years ago