eset / malware-ioc
Indicators of Compromises (IOC) of our various investigations
☆1,758Updated last week
Alternatives and similar repositories for malware-ioc:
Users that are interested in malware-ioc are comparing it to the libraries listed below
- yarGen is a generator for YARA rules☆1,626Updated 2 weeks ago
- YARA signature and IOC database for my scanners and tools☆2,596Updated this week
- ReversingLabs YARA Rules☆814Updated last week
- A toolset to make a system look as if it was the victim of an APT attack☆2,570Updated last year
- An informational repo about hunting for adversaries in your IT environment.☆1,767Updated 3 years ago
- A collection of sources of indicators of compromise.☆850Updated 6 months ago
- Indicators from Unit 42 Public Reports☆710Updated 2 weeks ago
- FakeNet-NG - Next Generation Dynamic Network Analysis Tool☆1,895Updated 2 weeks ago
- Repository of YARA rules made by Trellix ATR Team☆592Updated last month
- Your Everyday Threat Intelligence☆1,844Updated this week
- Noriben - Portable, Simple, Malware Analysis Sandbox☆1,149Updated last week
- FAME Automates Malware Evaluation☆890Updated last week
- A curated list of awesome YARA rules, tools, and people.☆3,772Updated 3 weeks ago
- Windows Events Attack Samples☆2,345Updated 2 years ago
- Loki - Simple IOC and YARA Scanner☆3,516Updated 4 months ago
- Digital Forensics artifact repository☆1,106Updated 3 months ago
- Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups☆706Updated 2 years ago
- Online hash checker for Virustotal and other services☆824Updated last month
- A collection of malware samples and relevant dissection information, most probably referenced from http://blog.inquest.net☆908Updated last year
- DRAKVUF Sandbox - automated hypervisor-level malware analysis system☆1,120Updated this week
- Sophos-originated indicators-of-compromise from published reports☆578Updated 3 weeks ago
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,268Updated 3 months ago
- Re-play Security Events☆1,637Updated last year
- Detect Tactics, Techniques & Combat Threats☆2,145Updated 2 months ago
- Clusters and elements to attach to MISP events or attributes (like threat actors)☆558Updated this week
- An Active Defense and EDR software to empower Blue Teams☆1,271Updated last year
- Malware Configuration And Payload Extraction☆754Updated 5 months ago
- Cyber Threat Intelligence Repository expressed in STIX 2.0☆1,836Updated 5 months ago
- Repository of yara rules☆4,362Updated last year
- Malware samples, analysis exercises and other interesting resources.☆1,544Updated last year