hpthreatresearch / iocsLinks
Indicators of Compromise (IOCs) accompanying HP Threat Research blog posts and reports.
☆29Updated last year
Alternatives and similar repositories for iocs
Users that are interested in iocs are comparing it to the libraries listed below
Sorting:
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆86Updated 3 years ago
- Scripts and tools accompanying HP Threat Research blog posts and reports.☆50Updated last year
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- Threat Detection Rules (Snort/Sigma/Yara)☆13Updated last year
- This repository is for Indicators of Compromise (IOCs) from Zscaler ThreatLabz public reports☆73Updated 7 months ago
- Jupyter Notebooks for Cyber Threat Intelligence☆35Updated last year
- Python based CLI for MalwareBazaar☆37Updated 8 months ago
- 100 Days of YARA to be updated with rules & ideas as the year progresses☆60Updated 2 years ago
- This repository contains OpenIOC rules to aid in hunting for indicators of compromise and TTPs focused on Advanced Persistent Threat grou…☆25Updated last year
- Active C2 IoCs☆99Updated 2 years ago
- JPCERT/CC public YARA rules repository☆110Updated 7 months ago
- Random hunting ordiented yara rules☆97Updated 2 years ago
- Yara station is a management portal for Neo23x0-Loki. The mission is to transform the standalone nature of the Loki scanner into a centra…☆36Updated 3 years ago
- Python library to query various sources of threat intelligence for data on domains, file hashes, and IP addresses.☆31Updated last year
- ☆19Updated 4 years ago
- An experimental script to perform bulk parsing of arbitrary file features with YARA and console logging.☆21Updated 2 years ago
- Rapid7 Labs operates as the division of Rapid7 focused on threat research. It is renowned for providing comprehensive threat intelligence…☆67Updated last month
- Research indicators and detection rules☆67Updated last year
- Links to malware-related YARA rules☆15Updated 2 years ago
- Library of threat hunts to get any user started!☆44Updated 4 years ago
- Collection of YARA signatures from individual research☆44Updated last year
- ☆19Updated 3 years ago
- Rhaegal is a tool written in Python 3 used to scan Windows Event Logs for suspicious logs. Rhaegal uses custom rule format to detect sus…☆41Updated last year
- IOC Collection 2022☆57Updated 2 years ago
- YARA rule metadata specification and validation utility / Spécification et validation pour les règles YARA☆104Updated 2 months ago
- Proofpoint - Emerging Threats - Threat Research tools + publicly shared intel and documentation☆74Updated 2 weeks ago
- Threat intelligence and threat detection indicators (IOC, IOA)☆52Updated 4 years ago
- YARA rule analyzer to improve rule quality and performance☆102Updated 3 months ago
- Repository with Sample threat hunting notebooks on Security Event Log Data Sources☆65Updated 2 years ago
- ☆21Updated 4 months ago