Tracking APT IOCs
☆25Nov 16, 2020Updated 5 years ago
Alternatives and similar repositories for ThreatIntelligence
Users that are interested in ThreatIntelligence are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Scripts, Yara rules and other files developed during malware investigations☆27Aug 19, 2022Updated 3 years ago
- Steezy - Ghetto Yara Generation☆15Mar 27, 2023Updated 3 years ago
- ☆22Dec 22, 2020Updated 5 years ago
- Exporting MISP event attributes to yara rules usable with Thor apt scanner☆24Mar 27, 2017Updated 9 years ago
- ☆13Nov 10, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A fast library for parsing and importing Windows Event Logs into Elasticsearch.☆86Mar 20, 2026Updated last week
- WslinkVMAnalyzer is a tool to facilitate analysis of code protected by a virtual machine featured in Wslink malware☆47Jun 5, 2022Updated 3 years ago
- Reverse engineered source code of the autochk rootkit☆211Nov 1, 2019Updated 6 years ago
- Vuls Beater for Elasticsearch - connecting vuls☆17Dec 15, 2020Updated 5 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 7 years ago
- All in one - Malware + Analysis by Cylance☆11Nov 23, 2018Updated 7 years ago
- MITRE ATT&CK visualizations☆12Jan 28, 2022Updated 4 years ago
- Creating a Feed of MISP Events from ThreatFox (by abuse.ch)☆19Jun 2, 2021Updated 4 years ago
- IOC from articles, tweets for archives☆318Dec 12, 2023Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Build Automated Machine Images for MISP☆29Jun 9, 2023Updated 2 years ago
- A collection of Indicators of Compromise (IoCs), most aligning with samples derived from the signatures in the YARA-Signatures repo☆29Jun 11, 2020Updated 5 years ago
- a very simple rootkit for fun☆19Nov 6, 2018Updated 7 years ago
- The Multiplatform Linux Sandbox☆16Dec 19, 2023Updated 2 years ago
- ☆21Apr 19, 2024Updated last year
- Automatic tool to find arbitrary Intent that gets reflected back vulnerabilities on Android apps.☆12Nov 15, 2022Updated 3 years ago
- Go port of tput☆10Mar 8, 2016Updated 10 years ago
- ☆15Jun 5, 2019Updated 6 years ago
- Official resource of the paper "Traditional and Context-Specific Spam Detection in Low Resource Settings", Machine Learning Journal 2022☆13Jun 11, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- At some point, I learned about a method to perform a binary search on a file in order to identify its AV signature and change it to bypas…☆36Aug 3, 2020Updated 5 years ago
- Simple decrypter for strings used in SamSam Ransomware samples.☆18Feb 21, 2020Updated 6 years ago
- YARA Language Server☆74Feb 3, 2026Updated last month
- Vaccine for STOP/DJVU ransomware, prevents encryption☆25Oct 30, 2025Updated 4 months ago
- RemotePSpy provides live monitoring of remote PowerShell sessions, which is particularly useful for older (pre-5.0) versions of PowerShel…☆19Mar 12, 2020Updated 6 years ago
- Telsy CTI Research Team☆57Dec 15, 2020Updated 5 years ago
- Various config files obtained during malware analysis☆67Oct 31, 2018Updated 7 years ago
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆121Mar 4, 2026Updated 3 weeks ago
- 分析cobaltstrike c2 协议☆68Feb 24, 2020Updated 6 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Analysis Reports of Malwares☆14Jun 21, 2019Updated 6 years ago
- WIP - A tutorial for OWASP ZAP☆13Feb 12, 2020Updated 6 years ago
- Updates the Emerging Threats open ruleset for Suricata☆10Sep 20, 2015Updated 10 years ago
- Python script to automatically create sigma rules from The hive observables☆25Mar 17, 2019Updated 7 years ago
- Collection of YARA signatures from individual research☆44Nov 20, 2023Updated 2 years ago
- A Zeek package to detect CVE-2021-42292, a Microsoft Excel local privilege escalation exploit.☆18Nov 11, 2021Updated 4 years ago
- A collection of Covid-19 related threat intelligence and resources.☆19Jul 17, 2020Updated 5 years ago