interprobe / IoCData
IoC Feed for security analysts etc.
☆13Updated 2 years ago
Alternatives and similar repositories for IoCData:
Users that are interested in IoCData are comparing it to the libraries listed below
- Hive v5 file decryption algorithm☆34Updated 2 years ago
- My Malware Analysis Reports☆20Updated 2 years ago
- Signature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces!☆82Updated last year
- A small utility to deal with malware embedded hashes.☆49Updated last year
- ☆66Updated 2 years ago
- Sentello is python script that simulates the anti-evasion and anti-analysis techniques used by malware.☆73Updated 4 years ago
- ☆25Updated 4 months ago
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆44Updated 2 years ago
- Extracting AsyncRAT configuration using CyberChef☆12Updated 2 years ago
- Evasion Escaper is a project aimed at evading the checks that malicious software performs to detect if it's running in a virtual environm…☆105Updated last month
- Malware Analysis tools☆25Updated 6 months ago
- ☆14Updated 2 years ago
- ☆22Updated 10 months ago
- ☆71Updated last year
- Community Detection Signature Build and Distribution Pipeline for YARA, Suricata, Snort and Sigma☆27Updated last year
- C2 Active Scanner☆55Updated 9 months ago
- ☆34Updated last month
- Code for the paper "EMBERSim: A Large-Scale Databank for Boosting Similarity Search in Malware Analysis"☆28Updated last year
- Configuration Extractors for Malware☆93Updated 2 months ago
- ATLAS - Malware Analysis Description☆20Updated last year
- ☆21Updated last year
- A robust, multiprocessing-capable, multi-family RAT config parser/config extractor for AsyncRAT, DcRAT, VenomRAT, QuasarRAT, XWorm, Xeno …☆43Updated last month
- A collection of Tools and Rules for decoding Brute Ratel C4 badgers☆62Updated 2 years ago
- information about ransomware groups (Ransomware Analysis Notes)☆36Updated last year
- Notes and IoCs of fresh malware☆57Updated 8 months ago
- ☆19Updated 11 months ago
- Scripts to help and speed up reversing activities☆10Updated 3 months ago
- CLI-based 802.11 Rogue (Fake) AP & Hidden AP Spotter☆12Updated 6 months ago
- ⚠️ Malware Development training ⚠️☆30Updated last month
- Scripts, Yara rules and other files developed during malware investigations☆25Updated 2 years ago