Ponmocup Indicators of Compromise
☆11Feb 4, 2016Updated 10 years ago
Alternatives and similar repositories for ponmocup
Users that are interested in ponmocup are comparing it to the libraries listed below
Sorting:
- Yara rules☆49Jan 28, 2014Updated 12 years ago
- Custom rules for yara-integrated scans☆16Jun 5, 2013Updated 12 years ago
- CryptoPHP Indicators of Compromise☆127Dec 3, 2014Updated 11 years ago
- API to access the Redis database of a BGP Ranking instance.☆17Dec 11, 2017Updated 8 years ago
- The repository contains IOCs in CSV format for APT, Cyber Crimes, Malware and Trojan and whatever I found as part of hunting and research☆12Jun 10, 2017Updated 8 years ago
- Poison Ivy Appendix/Extras☆18Aug 21, 2013Updated 12 years ago
- Graph-theoretical investigation of a corpus of malware obtained from the web☆21Jul 6, 2014Updated 11 years ago
- A tool to download malwares☆16May 22, 2023Updated 2 years ago
- My Yara Rules Collection☆52Feb 7, 2016Updated 10 years ago
- A collection of Yara rules I have created so far☆16Oct 26, 2020Updated 5 years ago
- Actionable analytics designed to combat threats based on MITRE's ATT&CK.☆23Aug 21, 2019Updated 6 years ago
- Collection of IDA Pro plugins I wrote over the years☆24May 8, 2010Updated 15 years ago
- Extract, defang, resolve names and IPs from text☆23Jan 29, 2026Updated last month
- VMware Snapshot Forensic Comparison Scripts☆25Mar 19, 2013Updated 12 years ago
- dnssinkholelist is a python package focused on combining open source lists of malicious domains, dynamic dns domains, and advertisement d…☆18Apr 13, 2016Updated 9 years ago
- Parses Java Cache IDX files☆40Feb 28, 2018Updated 8 years ago
- A Python ctypes package for libyara☆31Aug 4, 2015Updated 10 years ago
- malware-traffic-analysis.net PCAPs repository.☆37Jun 9, 2016Updated 9 years ago
- ☆50Apr 10, 2016Updated 9 years ago
- malware-encyclopedias is a set of tools to gather malware names and descriptions☆19May 19, 2016Updated 9 years ago
- Email Abuse - A Versatile Software for Email review, analysis and reporting☆21Jul 17, 2015Updated 10 years ago
- Linux-KVM with rVMI extensions☆22Aug 28, 2017Updated 8 years ago
- ☆16Jan 31, 2015Updated 11 years ago
- Yara rules for malware families seen as part of targeted threats project☆141Nov 17, 2016Updated 9 years ago
- MacOS incident Response Toolkit. Mostly written while stuck on a NJTransit train.☆20Feb 20, 2020Updated 6 years ago
- Shared yara rules☆30Mar 17, 2014Updated 11 years ago
- geolocate ip addresses in IIS logs☆20Jan 8, 2025Updated last year
- ASERT shared scripts for reversing☆32Feb 5, 2018Updated 8 years ago
- Modified edition of cuckoomon☆51Jun 4, 2018Updated 7 years ago
- AMIRA: Automated Malware Incident Response & Analysis☆151Feb 3, 2026Updated last month
- Multiple rules for yara-project for detect compiler/packer/protector☆33Dec 24, 2019Updated 6 years ago
- BinCrowd Plugin for IDA Pro☆44Jan 10, 2012Updated 14 years ago
- Maltego CaseFile entities for information security investigations, malware analysis and incident response☆68Jan 21, 2018Updated 8 years ago
- Yaras Random☆24Feb 21, 2019Updated 7 years ago
- Injected malicious code into legitimate andoid applications. Converted a keyboard app into a keylogger and an MP3 downloader into an imag…☆19Aug 8, 2014Updated 11 years ago
- IOC (Indicator of Compromise) Extractor: a program to help extract IOCs from text files.☆135Jan 14, 2016Updated 10 years ago
- Malice Yara Plugin☆30Sep 8, 2019Updated 6 years ago
- Blackfin IDA Pro Plugin☆34Sep 2, 2016Updated 9 years ago
- Malware analysis using Docker project☆25Mar 3, 2016Updated 10 years ago