hpthreatresearch / iocsView external linksLinks
Indicators of Compromise (IOCs) accompanying HP Threat Research blog posts and reports.
☆29Apr 10, 2024Updated last year
Alternatives and similar repositories for iocs
Users that are interested in iocs are comparing it to the libraries listed below
Sorting:
- Scripts and tools accompanying HP Threat Research blog posts and reports.☆50Apr 10, 2024Updated last year
- ☆129Jan 29, 2024Updated 2 years ago
- Quick lookup files for SUNBURST Backdoor☆12Dec 15, 2020Updated 5 years ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- A collection of Python resources for Blue Team security work☆16Sep 23, 2018Updated 7 years ago
- ☆11Feb 22, 2022Updated 3 years ago
- This directory contains random scripts from threat hunting or malware research☆11Feb 15, 2018Updated 8 years ago
- Hundred Days of Yara Challenge☆12Jun 21, 2022Updated 3 years ago
- Threat hunting with Sysmon and ArangoDB Graphs☆12Apr 16, 2020Updated 5 years ago
- ☆11Jun 12, 2023Updated 2 years ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Apr 18, 2020Updated 5 years ago
- Operation Wocao - Indicators of Compromise☆30Dec 19, 2019Updated 6 years ago
- ☆15Sep 26, 2022Updated 3 years ago
- Cyber Threats Detection Rules☆14Sep 16, 2025Updated 5 months ago
- Triaging Windows event logs based on SANS Poster☆46Nov 22, 2025Updated 2 months ago
- Finding your secret(Credential, API Key, AWS Key, Token, etc.) in your source code, files☆17Jan 26, 2026Updated 3 weeks ago
- 威胁检测规则集☆15Jul 5, 2019Updated 6 years ago
- Active C2 IoCs☆99Nov 28, 2022Updated 3 years ago
- A NodeJS Template for a Twitter Bot that Tracks Transactions to Bitcoin Wallets☆20May 7, 2018Updated 7 years ago
- Indicators of compromise☆17Jan 29, 2026Updated 2 weeks ago
- Just my findings of malwares☆43Aug 26, 2022Updated 3 years ago
- Sunburst IOCs for Splunk Ingest☆18Jan 28, 2021Updated 5 years ago
- ☆22May 29, 2020Updated 5 years ago
- CVE-2021-1675 LPE PoC in Nim (PrintNightmare Local Privilege Escalation)☆18Dec 5, 2021Updated 4 years ago
- CCP, Kesha Williams, 11-5-2020☆20Jul 6, 2023Updated 2 years ago
- Indicator of Compromise Scanner for CVE-2019-19781☆94Mar 25, 2020Updated 5 years ago
- Incident response teams usually working on the offline data, collecting the evidence, then analyze the data☆45Jan 2, 2022Updated 4 years ago
- Manage Your Large Team of Consultants☆11Sep 18, 2025Updated 4 months ago
- This is a threat intelligence automatic crawling tool that also contains some high-value threat intelligence.☆21Jun 2, 2021Updated 4 years ago
- The Web Audit Search Engine - Index and Search HTTP Requests and Responses in Web Application Audits with ElasticSearch☆23Oct 25, 2018Updated 7 years ago
- Incident Response Methodologies (IRM), also called Incident Playbook, based on the work done by the CERT Societe General☆24Dec 16, 2021Updated 4 years ago
- Cyber Underground General Intelligence Requirements☆97Feb 2, 2024Updated 2 years ago
- Virus Total Free - IOC parser and report generator☆25Mar 19, 2023Updated 2 years ago
- Tiny library to parse the subdomain, domain, and tld extension from a host string☆23Apr 1, 2022Updated 3 years ago
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆59Oct 5, 2025Updated 4 months ago
- This repository provides tools to fight against Emotet malware. You can protect your system using these tools☆23Jan 24, 2020Updated 6 years ago
- My first trial at Ethical Hacking Write Ups☆23Jul 23, 2020Updated 5 years ago
- A script to assist in processing forensic RAM captures for malware triage☆26Feb 4, 2021Updated 5 years ago
- This repository contains zip archives of pcaps for our Wireshark tutorial about examining Emotet infection traffic. The password for any …☆25Jan 11, 2021Updated 5 years ago