Repository with selected IOCs and YARA rules for threat hunting.
☆35May 21, 2025Updated 9 months ago
Alternatives and similar repositories for ioc_signatures
Users that are interested in ioc_signatures are comparing it to the libraries listed below
Sorting:
- ☆11Mar 12, 2021Updated 4 years ago
- A guide on how to write fast and memory friendly YARA rules☆166Feb 11, 2025Updated last year
- A collection of my public YARA signatures for various malware families☆30Sep 20, 2024Updated last year
- Imphash-like calculation on Golang binaries☆49Jul 2, 2022Updated 3 years ago
- Indicators of compromise☆17Jan 29, 2026Updated last month
- Configurations for DFIR ORC☆28Mar 28, 2024Updated last year
- A tool to support the reporting of Authenticode Certificates by reducing the effort on individuals to report.☆40Feb 19, 2026Updated 2 weeks ago
- Collection of rules created using YARA-Signator over Malpedia☆141Jan 6, 2026Updated 2 months ago
- CLI tool to compute the TypeRefHash for .NET binaries.☆19Nov 10, 2021Updated 4 years ago
- A YARA Rule Performance Measurement Tool☆61Feb 26, 2024Updated 2 years ago
- This repository is for Indicators of Compromise (IOCs) from Zscaler ThreatLabz public reports☆78Jan 26, 2026Updated last month
- Interactive summary of Gartner's Magic Quadrant for Web Content Management with d3.js☆17Oct 15, 2012Updated 13 years ago
- Network detector for Winnti malware☆21Mar 6, 2018Updated 8 years ago
- Library of threat hunts to get any user started!☆50Sep 4, 2020Updated 5 years ago
- Yara rules☆22Mar 27, 2023Updated 2 years ago
- Some ELF Malwares☆10Mar 11, 2022Updated 3 years ago
- Windows privileges add to the complexity of Windows user permissions. Each additional user added to a group could lead to a domain compro…☆10Mar 2, 2018Updated 8 years ago
- ☆11May 2, 2022Updated 3 years ago
- Mimikatz embedded as classes☆28Oct 25, 2021Updated 4 years ago
- Detection in the form of Yara, Snort and ClamAV signatures.☆249Nov 1, 2024Updated last year
- Yara Rules for Modern Malware☆78Mar 3, 2024Updated 2 years ago
- Thor Artifacts for Velociraptor☆19Dec 2, 2025Updated 3 months ago
- Safe Rust API to libesedb☆12Sep 10, 2025Updated 5 months ago
- Terraform manifests for Giantnetes control plane installation☆17May 22, 2025Updated 9 months ago
- Hunt the windows Registry automatically using VQL☆14Jan 6, 2026Updated 2 months ago
- .NET deobfuscator and unpacker (with a control flow unflattener for DoubleZero added).☆29Jun 14, 2022Updated 3 years ago
- custom Python script to perform Yara matching in Cortex XDR☆14May 18, 2021Updated 4 years ago
- DevGuard Web Frontend - Secure your Software Supply Chain - Attestation-based compliance as Code, manage your CVEs seamlessly, Integrate…☆22Updated this week
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆28Apr 22, 2023Updated 2 years ago
- Collection of generic YARA rules☆16Aug 17, 2025Updated 6 months ago
- Decoders for 7ev3n ransomware☆17Oct 24, 2016Updated 9 years ago
- Invoke-KleptoKitty - Deploys Payloads and collects credentials☆30Jul 28, 2021Updated 4 years ago
- ☆12Jun 6, 2025Updated 9 months ago
- A collection of my yara rules☆34Jul 11, 2023Updated 2 years ago
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆34Jun 27, 2025Updated 8 months ago
- Some YARA rules i will add from time to time☆67Mar 25, 2023Updated 2 years ago
- Threat intelligence and threat detection indicators (IOC, IOA)☆52Nov 27, 2020Updated 5 years ago
- Yara rules written by me, for free use.☆20Nov 26, 2021Updated 4 years ago
- Easily scan with multiple yara rules from different sources.☆14Mar 9, 2024Updated 2 years ago