☆55Mar 5, 2026Updated 2 weeks ago
Alternatives and similar repositories for iocs
Users that are interested in iocs are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Indicators of compromise☆17Jan 29, 2026Updated last month
- ☆18Mar 26, 2024Updated last year
- IOCs collected during day-to-day activities☆119Updated this week
- ☆31Feb 28, 2025Updated last year
- Hundred Days of Yara Challenge☆12Jun 21, 2022Updated 3 years ago
- Awesome list of keywords and artifacts for Threat Hunting sessions☆648Aug 4, 2025Updated 7 months ago
- CarbonBlack EDR detection rules and response actions☆73Sep 10, 2024Updated last year
- a tiny program to consume from ETW providers for research☆55Jan 4, 2025Updated last year
- JPCERT/CC public YARA rules repository☆109Mar 9, 2026Updated 2 weeks ago
- Rapid7 Labs operates as the division of Rapid7 focused on threat research. It is renowned for providing comprehensive threat intelligence…☆81Mar 10, 2026Updated last week
- ☆11Jun 12, 2023Updated 2 years ago
- MSIX Building Made Easy for Defenders☆64Aug 25, 2025Updated 6 months ago
- Exploit for Arbitrary File Move vulnerability in ZoneAlarm AV☆26Sep 26, 2022Updated 3 years ago
- ☆15May 3, 2024Updated last year
- This repo will contain the core detection, only for Cobaltstrike's leaked versions. Non-leaked version detections wont be shared☆89Oct 12, 2023Updated 2 years ago
- ☆34Nov 11, 2025Updated 4 months ago
- AI-powered reverse engineering assistant that bridges IDA Pro with language models through MCP.☆57Updated this week
- IOCs for various malware families☆11Jul 18, 2024Updated last year
- Helps defenders find their WSUS configurations in the wake of CVE-2025-59287☆46Oct 28, 2025Updated 4 months ago
- A public repository of MITRE ATT&ACK TTP mappings by BushidoUK for OSINT reports that lack a section breaking down the TTPs.☆27Mar 20, 2025Updated last year
- 🐻❄️ 🏹 Threat hunting with Polars and flaws.cloud AWS CloudTrail datasets.☆14May 22, 2024Updated last year
- IR drill plateform☆23Jul 29, 2025Updated 7 months ago
- An introduction to detection engineering☆14Jan 3, 2025Updated last year
- Repository where I hold random detection and threat hunting queries that I come up with based on different sources of information (or eve…☆280Dec 20, 2025Updated 3 months ago
- ☆37Aug 23, 2022Updated 3 years ago
- This repository contains the analysis reports, technical details or any tools created for helping in malware analysis. Additionally, the …☆22Jun 17, 2025Updated 9 months ago
- A structured, continuously updated threat-intelligence repository focused on ransomware families and threat actors.☆38Updated this week
- This repository contains supplemental items including IOCs, and signatures discussed in Huntress blogposts, and other media.☆47Feb 27, 2026Updated 3 weeks ago
- Globally distributed honeypots and HoneyNets IOCs and file reversing☆16Apr 22, 2024Updated last year
- Enhanced, Faster, Better version of the exploit☆25Dec 27, 2025Updated 2 months ago
- Automatically created C2 Feeds☆667Updated this week
- Sigma detection rules for hunting with the threathunting-keywords project☆58Mar 2, 2025Updated last year
- ☆23Jul 7, 2023Updated 2 years ago
- A collection of Tools and Rules for decoding Brute Ratel C4 badgers☆66Jul 7, 2022Updated 3 years ago
- This repository contains indicators of compromise (IOCs) of our various investigations.☆316Nov 4, 2025Updated 4 months ago
- ☆21May 8, 2022Updated 3 years ago
- A curated collection of DFIR skills and workflows for InfoSec practitioners.☆260Feb 8, 2026Updated last month
- Elasticsearch Stack Overflow Vulnerability☆18Sep 23, 2023Updated 2 years ago
- Elastic Security detection content for Endpoint☆1,389Mar 16, 2026Updated last week