☆54Feb 2, 2026Updated last month
Alternatives and similar repositories for iocs
Users that are interested in iocs are comparing it to the libraries listed below
Sorting:
- Indicators of compromise☆17Jan 29, 2026Updated last month
- ☆18Mar 26, 2024Updated last year
- CarbonBlack EDR detection rules and response actions☆73Sep 10, 2024Updated last year
- Exploit for Arbitrary File Move vulnerability in ZoneAlarm AV☆26Sep 26, 2022Updated 3 years ago
- IOCs for various malware families☆11Jul 18, 2024Updated last year
- A public repository of MITRE ATT&ACK TTP mappings by BushidoUK for OSINT reports that lack a section breaking down the TTPs.☆27Mar 20, 2025Updated 11 months ago
- a tiny program to consume from ETW providers for research☆54Jan 4, 2025Updated last year
- Awesome list of keywords and artifacts for Threat Hunting sessions☆638Aug 4, 2025Updated 6 months ago
- Hundred Days of Yara Challenge☆12Jun 21, 2022Updated 3 years ago
- ☆11Jun 12, 2023Updated 2 years ago
- ☆15May 3, 2024Updated last year
- Helps defenders find their WSUS configurations in the wake of CVE-2025-59287☆46Oct 28, 2025Updated 4 months ago
- JPCERT/CC public YARA rules repository☆109Nov 14, 2025Updated 3 months ago
- IOCs collected during day-to-day activities☆109Feb 24, 2026Updated last week
- A tool for secrets management, encryption as a service, and privileged access management☆13Jul 17, 2025Updated 7 months ago
- ☆31Feb 28, 2025Updated last year
- MSIX Building Made Easy for Defenders☆59Aug 25, 2025Updated 6 months ago
- Repository where I hold random detection and threat hunting queries that I come up with based on different sources of information (or eve…☆277Dec 20, 2025Updated 2 months ago
- Enhanced, Faster, Better version of the exploit☆25Dec 27, 2025Updated 2 months ago
- An introduction to detection engineering☆14Jan 3, 2025Updated last year
- ☆34Nov 11, 2025Updated 3 months ago
- Globally distributed honeypots and HoneyNets IOCs and file reversing☆16Apr 22, 2024Updated last year
- A tool to check microsofts user real endpoint to get data about a tenant.☆16Feb 6, 2025Updated last year
- A library and command line tool for extracting indicators of compromise (IOCs) from security reports in PDF, HTML, Word, or text format☆49Dec 22, 2025Updated 2 months ago
- Elasticsearch Stack Overflow Vulnerability☆18Sep 23, 2023Updated 2 years ago
- IR drill plateform☆23Jul 29, 2025Updated 7 months ago
- This Python-based GUI application allows you to track the latest security vulnerabilities (CVEs) using the☆40Apr 1, 2025Updated 11 months ago
- Weaponized EvilnoVNC: Scalable and semi-automated MFA-Phishing☆54Mar 8, 2025Updated 11 months ago
- Collection of scripts to automate the Malware Analysis process☆33Oct 27, 2025Updated 4 months ago
- AI-powered reverse engineering assistant that bridges IDA Pro with language models through MCP.☆47Feb 12, 2026Updated 2 weeks ago
- A curated collection of DFIR skills and workflows for InfoSec practitioners.☆251Feb 8, 2026Updated 3 weeks ago
- ☆21May 8, 2022Updated 3 years ago
- Visualize Microsoft Defender XDR process trees and security events☆33Aug 24, 2025Updated 6 months ago
- Offline AI Security Assistant for Air-Gapped Pentesting☆65Feb 22, 2026Updated last week
- This repository contains supplemental items including IOCs, and signatures discussed in Huntress blogposts, and other media.☆47Feb 8, 2026Updated 3 weeks ago
- This repo will contain the core detection, only for Cobaltstrike's leaked versions. Non-leaked version detections wont be shared☆89Oct 12, 2023Updated 2 years ago
- Simulation of Akira Ransomware with Invoke-AtomicTest☆18Jul 10, 2024Updated last year
- A simple UEFI bootkit made by @NSG650 and me.☆26Dec 29, 2024Updated last year
- This repository contains the analysis reports, technical details or any tools created for helping in malware analysis. Additionally, the …☆23Jun 17, 2025Updated 8 months ago