A library and command line tool for extracting indicators of compromise (IOCs) from security reports in PDF, HTML, Word, or text format
☆51Mar 20, 2026Updated last week
Alternatives and similar repositories for iocsearcher
Users that are interested in iocsearcher are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Source code for Watch Your Back: Identifying Cybercrime Financial Relationships in Bitcoin through Back-and-Forth Exploration☆12Sep 4, 2024Updated last year
- Summarize CTI reports with OpenAI☆18Updated this week
- Globally distributed honeypots and HoneyNets IOCs and file reversing☆16Apr 22, 2024Updated last year
- Powershell Functions to interact with TheHive-Project☆11Jun 27, 2019Updated 6 years ago
- AVClass malware labeling tool☆485Oct 22, 2024Updated last year
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports☆29Aug 21, 2023Updated 2 years ago
- Short deep dive into Threat Hunting on AWS☆18Oct 15, 2023Updated 2 years ago
- ☆28Dec 10, 2021Updated 4 years ago
- ☆56Mar 5, 2026Updated 3 weeks ago
- Repository of Yara rules created by the Stratosphere team☆29Jul 8, 2021Updated 4 years ago
- 布谷鸟异构图构建,对比学习☆11Jun 1, 2022Updated 3 years ago
- Original implementation and resources of DeepCASE as in the S&P '22 paper☆98Aug 1, 2023Updated 2 years ago
- Reduce false-positive alarms via voxel based point cloud analysis.☆22May 6, 2024Updated last year
- Melee: Tool to Detect Infections in MySQL Instances☆22Aug 6, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Python library to query various sources of threat intelligence for data on domains, file hashes, and IP addresses.☆31Nov 6, 2023Updated 2 years ago
- KRYSTAL: Knowledge Graph-based Framework for Tactical Attack Discovery in Audit Data☆41Apr 25, 2024Updated last year
- Collection of generic YARA rules☆16Mar 18, 2026Updated last week
- A collection of powershell scripts that are designed to be ran from a Microsoft Defender for Endpoint Live Response terminal, utilizing o…☆12Apr 26, 2023Updated 2 years ago
- ☆45Feb 26, 2024Updated 2 years ago
- Yara Rules for Modern Malware☆79Mar 3, 2024Updated 2 years ago
- IOCs from Google Threat Intelligence Group☆62Oct 9, 2025Updated 5 months ago
- ☆34Nov 11, 2025Updated 4 months ago
- ☆44Jul 11, 2025Updated 8 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- eAudit suite for recording provenance-related system calls on Linux☆20Jan 16, 2026Updated 2 months ago
- Repository of Yara rules dedicated to Phishing Kits Zip files☆238Mar 8, 2026Updated 3 weeks ago
- Indicators of compromise☆17Jan 29, 2026Updated 2 months ago
- ☆12Feb 22, 2023Updated 3 years ago
- Cobalt Strike DNS beacon parser☆11Nov 29, 2021Updated 4 years ago
- Cyber Threats Detection Rules☆14Sep 16, 2025Updated 6 months ago
- Help deobfuscate VBScript☆18Jul 1, 2022Updated 3 years ago
- version 2 of the Unified Cybersecurity Ontology☆16May 7, 2017Updated 8 years ago
- A mysql honeypot, still very very early stage☆22Oct 14, 2012Updated 13 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- An easy and efficient tool to build sequential recommendation system utilizing SASRec☆10Nov 1, 2023Updated 2 years ago
- Encode and decode 26-bit, 34-bit, or 38-bit Wiegand protocol credentials for communicating with access control systems in TypeScript or J…☆12Sep 3, 2024Updated last year
- ☆18Jan 22, 2026Updated 2 months ago
- ☆35Jan 13, 2026Updated 2 months ago
- This work shows the viability of automatically generated attack graphs that are used for adversary behavior execution in industrial contr…☆12Jun 3, 2021Updated 4 years ago
- OpenHCL Linux Kernel☆20Updated this week
- Docker + CVE-2015-2925 = escaping from --volume☆11Jun 30, 2015Updated 10 years ago