A library and command line tool for extracting indicators of compromise (IOCs) from security reports in PDF, HTML, Word, or text format
☆51Dec 22, 2025Updated 2 months ago
Alternatives and similar repositories for iocsearcher
Users that are interested in iocsearcher are comparing it to the libraries listed below
Sorting:
- Summarize CTI reports with OpenAI☆18Updated this week
- Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.☆16May 21, 2021Updated 4 years ago
- A compiler for the Meta Attack Language☆15Apr 11, 2022Updated 3 years ago
- Short deep dive into Threat Hunting on AWS☆17Oct 15, 2023Updated 2 years ago
- Globally distributed honeypots and HoneyNets IOCs and file reversing☆16Apr 22, 2024Updated last year
- ☆54Updated this week
- Reduce false-positive alarms via voxel based point cloud analysis.☆22May 6, 2024Updated last year
- Original implementation and resources of DeepCASE as in the S&P '22 paper☆98Aug 1, 2023Updated 2 years ago
- Avocado is a powerful C2 framework written in Python with stageless implants in Rust. Avocado's implant runs seamlessly on both Linux and…☆27Feb 15, 2026Updated 2 weeks ago
- Repository of Yara rules created by the Stratosphere team☆29Jul 8, 2021Updated 4 years ago
- A tool to help pentesters quickly identify privileged principals and second-order privilege escalation opportunities in unfamiliar AWS ac…☆145Nov 14, 2025Updated 3 months ago
- PackGenome: Automatically Generating Robust YARA Rules for Accurate Malware Packer Detection☆28Dec 6, 2023Updated 2 years ago
- ☆35Jan 13, 2026Updated last month
- ☆36Jun 10, 2024Updated last year
- ☆27Dec 10, 2021Updated 4 years ago
- ☆31Feb 28, 2025Updated last year
- Golang parser for OLE files☆33Dec 4, 2025Updated 3 months ago
- List of fraudulent asset domains that were blacklisted in LOBSTR☆18May 2, 2025Updated 10 months ago
- 安卓远控,天线6.0 无限使用版☆11Sep 9, 2023Updated 2 years ago
- 中国传媒大学网络安全本科专业课程课件☆29Feb 22, 2025Updated last year
- A small How-To on creating your own weaponized WSL file☆122Jul 23, 2025Updated 7 months ago
- SPPNet: An Appoach For Real-Time Encrypted Traffic Classification Using Deep Learning☆10Aug 6, 2024Updated last year
- A repository for a Deep Q-Learning approach to intrusion detection for networks cyber-attacks.☆10Sep 3, 2021Updated 4 years ago
- ☆36Jan 27, 2026Updated last month
- ☆35Nov 11, 2025Updated 3 months ago
- Yara Rules for Modern Malware☆78Mar 3, 2024Updated 2 years ago
- Rules shared by the community from 100 Days of YARA 2025☆38Jan 2, 2026Updated 2 months ago
- Plugin for x64dbg to generate Yara rules from function basic blocks.☆37Sep 2, 2017Updated 8 years ago
- TAXII 2.0 Server implemented in Node JS with MongoDB backend☆12Jan 3, 2023Updated 3 years ago
- un sensor pour récupérer les informations des prochaines marées☆12Jan 27, 2026Updated last month
- Pure python parser for Snort/Suricata rules.☆34Mar 13, 2024Updated last year
- Card Payments Simulation Tool For Indie Devs : Core Card Switch Engine, Fraud Engine, ATM/POS GUI Simulator , Admin Dash (Real-time MSG …☆19Jun 15, 2025Updated 8 months ago
- Offline amnesic live Linux distribution☆14Mar 8, 2025Updated 11 months ago
- Repository of Yara rules dedicated to Phishing Kits Zip files☆238Feb 9, 2026Updated 3 weeks ago
- KRYSTAL: Knowledge Graph-based Framework for Tactical Attack Discovery in Audit Data☆41Apr 25, 2024Updated last year
- Github action for linting AWS IAM policy documents☆38Jan 20, 2023Updated 3 years ago
- UEFI signing tools for Linux -- Forked to support AWS CloudHSM☆13Aug 25, 2021Updated 4 years ago
- An SSH honeypot written entirely in Go.☆12Dec 4, 2025Updated 3 months ago
- A collection of powershell scripts that are designed to be ran from a Microsoft Defender for Endpoint Live Response terminal, utilizing o…☆12Apr 26, 2023Updated 2 years ago