☆57Apr 16, 2026Updated 2 weeks ago
Alternatives and similar repositories for iocs
Users that are interested in iocs are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Indicators of compromise☆17Jan 29, 2026Updated 3 months ago
- CarbonBlack EDR detection rules and response actions☆73Sep 10, 2024Updated last year
- Living of the Land of Free SaaS☆71Mar 22, 2026Updated last month
- ☆18Mar 26, 2024Updated 2 years ago
- ☆31Feb 28, 2025Updated last year
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- IOCs collected during day-to-day activities☆129Apr 17, 2026Updated 2 weeks ago
- Awesome list of keywords and artifacts for Threat Hunting sessions☆654Aug 4, 2025Updated 8 months ago
- Hundred Days of Yara Challenge☆12Jun 21, 2022Updated 3 years ago
- a tiny program to consume from ETW providers for research☆56Jan 4, 2025Updated last year
- This repository contains Malicious Indicator of Compromise (IOC) blocklist for MISP, firewall which is vital for cybersecurity profession…☆121Sep 17, 2025Updated 7 months ago
- JPCERT/CC public YARA rules repository☆111Mar 9, 2026Updated last month
- ☆11Jun 12, 2023Updated 2 years ago
- MSIX Building Made Easy for Defenders☆64Aug 25, 2025Updated 8 months ago
- Exploit for Arbitrary File Move vulnerability in ZoneAlarm AV☆26Sep 26, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Rapid7 Labs operates as the division of Rapid7 focused on threat research. It is renowned for providing comprehensive threat intelligence…☆101Apr 20, 2026Updated last week
- ☆34Apr 8, 2026Updated 3 weeks ago
- IOCs for various malware families☆11Jul 18, 2024Updated last year
- This repo will contain the core detection, only for Cobaltstrike's leaked versions. Non-leaked version detections wont be shared☆92Oct 12, 2023Updated 2 years ago
- ☆16May 3, 2024Updated last year
- Helps defenders find their WSUS configurations in the wake of CVE-2025-59287☆46Oct 28, 2025Updated 6 months ago
- AI-powered reverse engineering assistant that bridges IDA Pro with language models through MCP.☆66Apr 8, 2026Updated 3 weeks ago
- A public repository of MITRE ATT&ACK TTP mappings by BushidoUK for OSINT reports that lack a section breaking down the TTPs.☆27Mar 20, 2025Updated last year
- ☆22Jan 31, 2023Updated 3 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- 🐻❄️ 🏹 Threat hunting with Polars and flaws.cloud AWS CloudTrail datasets.☆14May 22, 2024Updated last year
- IR drill plateform☆23Jul 29, 2025Updated 9 months ago
- An introduction to detection engineering☆14Jan 3, 2025Updated last year
- Automatically created C2 Feeds☆677Updated this week
- Repository where I hold random detection and threat hunting queries that I come up with based on different sources of information (or eve…☆281Dec 20, 2025Updated 4 months ago
- 15-stage Windows malware development & analysis course in Rust. Red team builds it, blue team detects it. All 15 binaries achieved 0/76 o…☆132Mar 27, 2026Updated last month
- ☆38Aug 23, 2022Updated 3 years ago
- This repository contains the analysis reports, technical details or any tools created for helping in malware analysis. Additionally, the …☆22Jun 17, 2025Updated 10 months ago
- A structured, continuously updated threat-intelligence repository focused on ransomware families and threat actors.☆39Updated this week
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- This repository contains supplemental items including IOCs, and signatures discussed in Huntress blogposts, and other media.☆48Feb 27, 2026Updated 2 months ago
- Globally distributed honeypots and HoneyNets IOCs and file reversing☆16Apr 22, 2024Updated 2 years ago
- Enhanced, Faster, Better version of the exploit☆25Dec 27, 2025Updated 4 months ago
- Secure access cloud terraform provider☆13Mar 18, 2026Updated last month
- Sigma detection rules for hunting with the threathunting-keywords project☆60Mar 2, 2025Updated last year
- Collection of different Azure/Entra focused solutions (Deployable templates, Function Apps, etc)☆81Apr 12, 2026Updated 2 weeks ago
- ☆23Jul 7, 2023Updated 2 years ago