Indicators of Compromise (IOCs) accompanying HP Threat Research blog posts and reports.
☆29Apr 10, 2024Updated last year
Alternatives and similar repositories for iocs
Users that are interested in iocs are comparing it to the libraries listed below
Sorting:
- Scripts and tools accompanying HP Threat Research blog posts and reports.☆50Apr 10, 2024Updated last year
- ☆129Jan 29, 2024Updated 2 years ago
- Splunk app to compare Endpoint Detection and Response solutions based on MITRE ATT&CK evaluations (APT3, APT29, Carbanak + FIN7, Wizard S…☆19Sep 5, 2022Updated 3 years ago
- Network detector for Winnti malware☆21Mar 6, 2018Updated 8 years ago
- Quick lookup files for SUNBURST Backdoor☆12Dec 15, 2020Updated 5 years ago
- This directory contains random scripts from threat hunting or malware research☆11Feb 15, 2018Updated 8 years ago
- ☆11Feb 22, 2022Updated 4 years ago
- A collection of Python resources for Blue Team security work☆16Sep 23, 2018Updated 7 years ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- Threat hunting with Sysmon and ArangoDB Graphs☆12Apr 16, 2020Updated 5 years ago
- A quick bash script that I created in order to speed up the creation of usable kali boxes.☆11Oct 29, 2021Updated 4 years ago
- ☆11Jun 12, 2023Updated 2 years ago
- Hundred Days of Yara Challenge☆12Jun 21, 2022Updated 3 years ago
- Feed of phish-domains found by Validin Threat Intelligince Platform☆34Mar 2, 2026Updated last week
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Apr 18, 2020Updated 5 years ago
- Operation Wocao - Indicators of Compromise☆30Dec 19, 2019Updated 6 years ago
- ☆15Sep 26, 2022Updated 3 years ago
- Cyber Threats Detection Rules☆14Sep 16, 2025Updated 5 months ago
- Triaging Windows event logs based on SANS Poster☆47Nov 22, 2025Updated 3 months ago
- 威胁检测规则集☆15Jul 5, 2019Updated 6 years ago
- Finding your secret(Credential, API Key, AWS Key, Token, etc.) in your source code, files☆17Jan 26, 2026Updated last month
- Active C2 IoCs☆99Nov 28, 2022Updated 3 years ago
- Indicators of compromise☆17Jan 29, 2026Updated last month
- ☆42Dec 22, 2020Updated 5 years ago
- Just my findings of malwares☆42Aug 26, 2022Updated 3 years ago
- Sunburst IOCs for Splunk Ingest☆18Jan 28, 2021Updated 5 years ago
- ☆22May 29, 2020Updated 5 years ago
- CVE-2021-1675 LPE PoC in Nim (PrintNightmare Local Privilege Escalation)☆18Dec 5, 2021Updated 4 years ago
- Epimitheus is a tool that uses graphical database Neo4j for Windows Events visualization.☆19Mar 13, 2022Updated 3 years ago
- CCP, Kesha Williams, 11-5-2020☆20Jul 6, 2023Updated 2 years ago
- Indicator of Compromise Scanner for CVE-2019-19781☆94Mar 25, 2020Updated 5 years ago
- Incident response teams usually working on the offline data, collecting the evidence, then analyze the data☆46Jan 2, 2022Updated 4 years ago
- This is a threat intelligence automatic crawling tool that also contains some high-value threat intelligence.☆21Jun 2, 2021Updated 4 years ago
- Manage Your Large Team of Consultants☆11Sep 18, 2025Updated 5 months ago
- Incident Response Methodologies (IRM), also called Incident Playbook, based on the work done by the CERT Societe General☆24Dec 16, 2021Updated 4 years ago
- ☆96May 5, 2025Updated 10 months ago
- Cyber Underground General Intelligence Requirements☆98Feb 2, 2024Updated 2 years ago
- Virus Total Free - IOC parser and report generator☆25Mar 19, 2023Updated 2 years ago
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆59Oct 5, 2025Updated 5 months ago