Indicator of Compromise Mapping Service
☆12Apr 15, 2014Updated 11 years ago
Alternatives and similar repositories for iocmap
Users that are interested in iocmap are comparing it to the libraries listed below
Sorting:
- Download all malicious files from a Kippo SSH honeypot database☆23Mar 24, 2014Updated 11 years ago
- Static Feature Extraction & Selection (used in conjunction with the MASTIFF framework)☆16Oct 19, 2016Updated 9 years ago
- Dockerized Cuckoo build☆10Aug 3, 2016Updated 9 years ago
- Malware analysis using Docker project☆25Mar 3, 2016Updated 9 years ago
- Bro things..☆15Oct 23, 2015Updated 10 years ago
- Graph-theoretical investigation of a corpus of malware obtained from the web☆21Jul 6, 2014Updated 11 years ago
- The Auditd Framework logs and applies security policy to linux auditd data☆15Jan 26, 2018Updated 8 years ago
- Just another tool to extract Indicator of compromise (ioc) from files☆29Oct 1, 2015Updated 10 years ago
- IOC (Indicator of Compromise) Extractor: a program to help extract IOCs from text files.☆135Jan 14, 2016Updated 10 years ago
- Malware analyses and helpful scripts☆29May 26, 2022Updated 3 years ago
- Download all packet captures from http://malware-traffic-analysis.net/☆20Aug 14, 2014Updated 11 years ago
- Bit9 Platform☆20Jun 23, 2017Updated 8 years ago
- List of scripts used for malware analysis☆15Aug 10, 2015Updated 10 years ago
- ThreatTracker is a Python script designed to monitor and generate alerts on given sets of indicators of compromise (IOCs) indexed by a se…☆70Mar 9, 2015Updated 10 years ago
- A Python script for indexing (putting) FireEye alert data into Elasticsearch...and notifying you too.☆16Dec 11, 2018Updated 7 years ago
- Malware analysis tool☆22Apr 27, 2025Updated 10 months ago
- Static and automated/dynamic malware analysis☆47Sep 28, 2015Updated 10 years ago
- Useful scripts, rules etc. for use with YARA☆27Feb 12, 2021Updated 5 years ago
- A REST API server for yara event notifications. Mapping file hashes to yara signatures in Elasticsearch for easy hash lookup or finding h…☆19May 12, 2015Updated 10 years ago
- Shared yara rules☆30Mar 17, 2014Updated 11 years ago
- Python tools for IOC (Indicator of Compromise) handling☆96Nov 25, 2021Updated 4 years ago
- Set of extra commands for kippo, the SSH honeypot daemon☆30Nov 15, 2015Updated 10 years ago
- Multiple rules for yara-project for detect compiler/packer/protector☆33Dec 24, 2019Updated 6 years ago
- Metadata Inspection Database Alerting System☆42Jul 26, 2013Updated 12 years ago
- REST/JSON interface to Burp Suite☆33Oct 12, 2020Updated 5 years ago
- This is a malware analysis project which expecte to generate snort rule via malicious network traffic☆28Apr 13, 2023Updated 2 years ago
- Snort_rules detection bad actors.☆29Aug 18, 2024Updated last year
- bro on debian with elasticsearch support☆24Mar 27, 2017Updated 8 years ago
- Snort in a Docker Container☆31Mar 21, 2014Updated 11 years ago
- Tools for VirusTotal☆37Nov 29, 2012Updated 13 years ago
- Honeypot (Dionaea and kippo) setup script☆83Nov 9, 2016Updated 9 years ago
- Windows10 hardening implemented in powershell for consumer or enterprise deployment☆26Nov 15, 2017Updated 8 years ago
- ☆207May 3, 2023Updated 2 years ago
- ☆10Aug 4, 2020Updated 5 years ago
- A Kali Linux Tool to assist with security audits and pentesting. Lots of wrappers for commonly used tools to help extend their usefulness…☆31Aug 2, 2013Updated 12 years ago
- Automation for VirusTotal☆31May 6, 2016Updated 9 years ago
- Threat Intelligence distribution☆31Dec 30, 2015Updated 10 years ago
- integrating bro into yara☆33Dec 9, 2014Updated 11 years ago
- Firmware analysis gone wild.☆41Aug 24, 2014Updated 11 years ago