Repository with selected IOCs and YARA rules for threat hunting.
☆35Apr 8, 2026Updated last week
Alternatives and similar repositories for ioc_signatures
Users that are interested in ioc_signatures are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Indicators of compromise☆17Jan 29, 2026Updated 2 months ago
- A guide on how to write fast and memory friendly YARA rules☆167Feb 11, 2025Updated last year
- Imphash-like calculation on Golang binaries☆49Jul 2, 2022Updated 3 years ago
- Windows privileges add to the complexity of Windows user permissions. Each additional user added to a group could lead to a domain compro…☆10Mar 2, 2018Updated 8 years ago
- Collection of rules created using YARA-Signator over Malpedia☆143Jan 6, 2026Updated 3 months ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- ☆11Mar 12, 2021Updated 5 years ago
- Thor Artifacts for Velociraptor☆19Dec 2, 2025Updated 4 months ago
- Yara rules☆22Mar 27, 2023Updated 3 years ago
- Detection in the form of Yara, Snort and ClamAV signatures.☆251Nov 1, 2024Updated last year
- A tool to support the reporting of Authenticode Certificates by reducing the effort on individuals to report.☆40Mar 25, 2026Updated 3 weeks ago
- Configurations for DFIR ORC☆28Mar 28, 2024Updated 2 years ago
- A YARA Rule Performance Measurement Tool☆61Feb 26, 2024Updated 2 years ago
- Hunt the windows Registry automatically using VQL☆15Jan 6, 2026Updated 3 months ago
- Library of threat hunts to get any user started!☆50Sep 4, 2020Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Network detector for Winnti malware☆21Mar 6, 2018Updated 8 years ago
- This repository is for Indicators of Compromise (IOCs) from Zscaler ThreatLabz public reports☆79Jan 26, 2026Updated 2 months ago
- ☆12May 2, 2022Updated 3 years ago
- Repository to provide files related to our blog articles.☆16May 26, 2025Updated 10 months ago
- A collection of my public YARA signatures for various malware families☆30Sep 20, 2024Updated last year
- A collection of my yara rules☆34Jul 11, 2023Updated 2 years ago
- A specification and style guide for YARA rules☆72Feb 17, 2024Updated 2 years ago
- ☆19Jul 21, 2022Updated 3 years ago
- .NET deobfuscator and unpacker (with a control flow unflattener for DoubleZero added).☆29Jun 14, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- orc2timeline extracts and analyzes artifacts contained in archives generated with DFIR-ORC.exe to create a timeline from them☆34Jun 27, 2025Updated 9 months ago
- YARA duplicate rule detection and removal. YARA rule index creation. YARA rule file merger.☆10Jan 19, 2026Updated 2 months ago
- C# Desktop GUI application that either performs YARA scan locally or prepares the scan in Active Directory domain environment with a few …☆36Dec 1, 2021Updated 4 years ago
- Yara Rules for Modern Malware☆79Mar 3, 2024Updated 2 years ago
- Collection of private Yara rules.☆380Jan 28, 2026Updated 2 months ago
- CLI tool to compute the TypeRefHash for .NET binaries.☆19Nov 10, 2021Updated 4 years ago
- A library implementing a generic SQL like query language.☆21Mar 25, 2026Updated 3 weeks ago
- Maps process creation logged by Sysmon uses Google Org Chart API☆23Mar 5, 2016Updated 10 years ago
- Threat intelligence and threat detection indicators (IOC, IOA)☆52Nov 27, 2020Updated 5 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Just Another broken Registry Parser (JARP)☆16May 23, 2024Updated last year
- A YARA rules repository continuously updated for monitoring the old and new threats from articles, incidents responses ...☆141Nov 19, 2023Updated 2 years ago
- ☆18Updated this week
- Collection of scripts used to analyse malware or emails☆20Oct 6, 2020Updated 5 years ago
- Some ELF Malwares☆10Mar 11, 2022Updated 4 years ago
- Some simple and useful tools☆15May 8, 2018Updated 7 years ago
- Collection of Suricata rule sets that I use modified to my environments.☆39Sep 13, 2020Updated 5 years ago