☆60May 8, 2026Updated 2 weeks ago
Alternatives and similar repositories for iocs
Users that are interested in iocs are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Indicators of compromise☆19Updated this week
- CarbonBlack EDR detection rules and response actions☆73Sep 10, 2024Updated last year
- Living of the Land of Free SaaS☆75Mar 22, 2026Updated 2 months ago
- ☆18Mar 26, 2024Updated 2 years ago
- ☆31Feb 28, 2025Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Awesome list of keywords and artifacts for Threat Hunting sessions☆655Aug 4, 2025Updated 9 months ago
- IOCs collected during day-to-day activities☆129May 15, 2026Updated last week
- Hundred Days of Yara Challenge☆12Jun 21, 2022Updated 3 years ago
- a tiny program to consume from ETW providers for research☆56Jan 4, 2025Updated last year
- JPCERT/CC public YARA rules repository☆111Mar 9, 2026Updated 2 months ago
- ☆11Jun 12, 2023Updated 2 years ago
- MSIX Building Made Easy for Defenders☆64Aug 25, 2025Updated 8 months ago
- Exploit for Arbitrary File Move vulnerability in ZoneAlarm AV☆26Sep 26, 2022Updated 3 years ago
- Rapid7 Labs operates as the division of Rapid7 focused on threat research. It is renowned for providing comprehensive threat intelligence…☆102May 14, 2026Updated last week
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆34Apr 29, 2026Updated 3 weeks ago
- IOCs for various malware families☆11Jul 18, 2024Updated last year
- This repo will contain the core detection, only for Cobaltstrike's leaked versions. Non-leaked version detections wont be shared☆92Oct 12, 2023Updated 2 years ago
- ☆16May 3, 2024Updated 2 years ago
- Helps defenders find their WSUS configurations in the wake of CVE-2025-59287☆46Oct 28, 2025Updated 6 months ago
- A public repository of MITRE ATT&ACK TTP mappings by BushidoUK for OSINT reports that lack a section breaking down the TTPs.☆27Mar 20, 2025Updated last year
- ☆22Jan 31, 2023Updated 3 years ago
- 🐻❄️ 🏹 Threat hunting with Polars and flaws.cloud AWS CloudTrail datasets.☆14May 22, 2024Updated 2 years ago
- IR drill plateform☆24Jul 29, 2025Updated 9 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- An introduction to detection engineering☆14Jan 3, 2025Updated last year
- Automatically created C2 Feeds☆716Updated this week
- AI-powered reverse engineering assistant that bridges IDA Pro with language models through MCP.☆68May 5, 2026Updated 2 weeks ago
- Repository where I hold random detection and threat hunting queries that I come up with based on different sources of information (or eve…☆282Dec 20, 2025Updated 5 months ago
- ☆38Aug 23, 2022Updated 3 years ago
- This repository contains the analysis reports, technical details or any tools created for helping in malware analysis. Additionally, the …☆24Jun 17, 2025Updated 11 months ago
- A structured, continuously updated threat-intelligence repository focused on ransomware families and threat actors.☆40May 11, 2026Updated last week
- This repository contains supplemental items including IOCs, and signatures discussed in Huntress blogposts, and other media.☆49Feb 27, 2026Updated 2 months ago
- Globally distributed honeypots and HoneyNets IOCs and file reversing☆16Apr 22, 2024Updated 2 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Enhanced, Faster, Better version of the exploit☆25Dec 27, 2025Updated 4 months ago
- Sigma detection rules for hunting with the threathunting-keywords project☆60Mar 2, 2025Updated last year
- Collection of different Azure/Entra focused solutions (Deployable templates, Function Apps, etc)☆81Apr 12, 2026Updated last month
- ☆24Jul 7, 2023Updated 2 years ago
- A collection of Tools and Rules for decoding Brute Ratel C4 badgers☆66Jul 7, 2022Updated 3 years ago
- This repo contains IOC, malware and malware analysis associated with Public cloud☆250Nov 11, 2024Updated last year
- This repository contains indicators of compromise (IOCs) of our various investigations.☆319Nov 4, 2025Updated 6 months ago