Indicators of Compromise (IOCs) accompanying HP Threat Research blog posts and reports.
☆28Apr 10, 2024Updated 2 years ago
Alternatives and similar repositories for iocs
Users that are interested in iocs are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆130Jan 29, 2024Updated 2 years ago
- Scripts and tools accompanying HP Threat Research blog posts and reports.☆50Apr 10, 2024Updated 2 years ago
- Feed of phish-domains found by Validin Threat Intelligince Platform☆36May 1, 2026Updated last week
- Indicators of compromise☆17Jan 29, 2026Updated 3 months ago
- Splunk app to compare Endpoint Detection and Response solutions based on MITRE ATT&CK evaluations (APT3, APT29, Carbanak + FIN7, Wizard S…☆19Sep 5, 2022Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆13Apr 18, 2020Updated 6 years ago
- Network detector for Winnti malware☆21Mar 6, 2018Updated 8 years ago
- This directory contains random scripts from threat hunting or malware research☆11Feb 15, 2018Updated 8 years ago
- Quick lookup files for SUNBURST Backdoor☆12Dec 15, 2020Updated 5 years ago
- Hundred Days of Yara Challenge☆12Jun 21, 2022Updated 3 years ago
- Rudimentary IP and URL threat feeds sourced from The Fakelabs Project.☆10Dec 13, 2025Updated 4 months ago
- Active C2 IoCs☆99Nov 28, 2022Updated 3 years ago
- ☆11Feb 22, 2022Updated 4 years ago
- This repository is for Indicators of Compromise (IOCs) from Zscaler ThreatLabz public reports☆79Jan 26, 2026Updated 3 months ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆96Apr 8, 2026Updated last month
- 威胁检测规则集☆15Jul 5, 2019Updated 6 years ago
- IOCs for various malware families☆11Jul 18, 2024Updated last year
- A collection of Python resources for Blue Team security work☆17Sep 23, 2018Updated 7 years ago
- Operation Wocao - Indicators of Compromise☆29Dec 19, 2019Updated 6 years ago
- A quick bash script that I created in order to speed up the creation of usable kali boxes.☆12Oct 29, 2021Updated 4 years ago
- Just my findings of malwares☆42Aug 26, 2022Updated 3 years ago
- ☆11Jun 12, 2023Updated 2 years ago
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆63Apr 11, 2026Updated 3 weeks ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Graphics, icons, and diagrams to support STIX 2☆48Jun 2, 2021Updated 4 years ago
- Virus Total Free - IOC parser and report generator☆25Mar 19, 2023Updated 3 years ago
- Finding your secret(Credential, API Key, AWS Key, Token, etc.) in your source code, files☆17Jan 26, 2026Updated 3 months ago
- ☆15Sep 26, 2022Updated 3 years ago
- ☆12Jun 22, 2022Updated 3 years ago
- ☆24Apr 10, 2024Updated 2 years ago
- Threat Intel IoCs + bits and pieces of dark matter. Published by Gen Threat Labs.☆449Apr 7, 2026Updated last month
- This utility can help determine if indicators of compromise (IOCs) exist in the log files of a Pulse Secure VPN Appliance for CVE-2019-11…☆28Aug 19, 2020Updated 5 years ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- The Web Audit Search Engine - Index and Search HTTP Requests and Responses in Web Application Audits with ElasticSearch☆24Oct 25, 2018Updated 7 years ago
- A NodeJS Template for a Twitter Bot that Tracks Transactions to Bitcoin Wallets☆20May 7, 2018Updated 8 years ago
- A collection of notes and rules (Snort/Suricata, Sigma, and YARA) to identify various samples of malware.☆14Sep 7, 2021Updated 4 years ago
- ☆35Jun 22, 2021Updated 4 years ago
- Sunburst IOCs for Splunk Ingest☆18Jan 28, 2021Updated 5 years ago
- Threat hunting with Sysmon and ArangoDB Graphs☆13Apr 16, 2020Updated 6 years ago
- ☆157Apr 14, 2026Updated 3 weeks ago