hvs-consulting / ioc_signaturesView external linksLinks
Repository with selected IOCs and YARA rules for threat hunting.
☆35May 21, 2025Updated 8 months ago
Alternatives and similar repositories for ioc_signatures
Users that are interested in ioc_signatures are comparing it to the libraries listed below
Sorting:
- ☆11Mar 12, 2021Updated 4 years ago
- A guide on how to write fast and memory friendly YARA rules☆164Feb 11, 2025Updated last year
- A collection of my public YARA signatures for various malware families☆30Sep 20, 2024Updated last year
- Imphash-like calculation on Golang binaries☆49Jul 2, 2022Updated 3 years ago
- Indicators of compromise☆17Jan 29, 2026Updated 2 weeks ago
- Configurations for DFIR ORC☆28Mar 28, 2024Updated last year
- A tool to support the reporting of Authenticode Certificates by reducing the effort on individuals to report.☆38Dec 22, 2025Updated last month
- Collection of rules created using YARA-Signator over Malpedia☆142Jan 6, 2026Updated last month
- CLI tool to compute the TypeRefHash for .NET binaries.☆19Nov 10, 2021Updated 4 years ago
- A YARA Rule Performance Measurement Tool☆61Feb 26, 2024Updated last year
- This repository is for Indicators of Compromise (IOCs) from Zscaler ThreatLabz public reports☆79Jan 26, 2026Updated 2 weeks ago
- Interactive summary of Gartner's Magic Quadrant for Web Content Management with d3.js☆17Oct 15, 2012Updated 13 years ago
- Network detector for Winnti malware☆21Mar 6, 2018Updated 7 years ago
- Library of threat hunts to get any user started!☆48Sep 4, 2020Updated 5 years ago
- Yara rules☆22Mar 27, 2023Updated 2 years ago
- Mimikatz embedded as classes☆28Oct 25, 2021Updated 4 years ago
- ☆11May 2, 2022Updated 3 years ago
- Some ELF Malwares☆10Mar 11, 2022Updated 3 years ago
- Hunt the windows Registry automatically using VQL☆13Jan 6, 2026Updated last month
- Windows privileges add to the complexity of Windows user permissions. Each additional user added to a group could lead to a domain compro…☆10Mar 2, 2018Updated 7 years ago
- Detection in the form of Yara, Snort and ClamAV signatures.☆248Nov 1, 2024Updated last year
- Yara Rules for Modern Malware☆78Mar 3, 2024Updated last year
- Safe Rust API to libesedb☆12Sep 10, 2025Updated 5 months ago
- Thor Artifacts for Velociraptor☆19Dec 2, 2025Updated 2 months ago
- Terraform manifests for Giantnetes control plane installation☆17May 22, 2025Updated 8 months ago
- .NET deobfuscator and unpacker (with a control flow unflattener for DoubleZero added).☆29Jun 14, 2022Updated 3 years ago
- Decoders for 7ev3n ransomware☆17Oct 24, 2016Updated 9 years ago
- custom Python script to perform Yara matching in Cortex XDR☆14May 18, 2021Updated 4 years ago
- ☆12Jun 6, 2025Updated 8 months ago
- DevGuard Web Frontend - Secure your Software Supply Chain - Attestation-based compliance as Code, manage your CVEs seamlessly, Integrate…☆22Updated this week
- Collection of generic YARA rules☆16Aug 17, 2025Updated 5 months ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆28Apr 22, 2023Updated 2 years ago
- Invoke-KleptoKitty - Deploys Payloads and collects credentials☆30Jul 28, 2021Updated 4 years ago
- A collection of my yara rules☆34Jul 11, 2023Updated 2 years ago
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆34Jun 27, 2025Updated 7 months ago
- Some YARA rules i will add from time to time☆66Mar 25, 2023Updated 2 years ago
- Threat intelligence and threat detection indicators (IOC, IOA)☆52Nov 27, 2020Updated 5 years ago
- Yara rules written by me, for free use.☆20Nov 26, 2021Updated 4 years ago
- Repository to provide files related to our blog articles.☆16May 26, 2025Updated 8 months ago