malicialab / iocsearcherView external linksLinks
A library and command line tool for extracting indicators of compromise (IOCs) from security reports in PDF, HTML, Word, or text format
☆47Dec 22, 2025Updated last month
Alternatives and similar repositories for iocsearcher
Users that are interested in iocsearcher are comparing it to the libraries listed below
Sorting:
- Summarize CTI reports with OpenAI☆17Feb 2, 2026Updated last week
- A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports☆28Aug 21, 2023Updated 2 years ago
- 各国或地区常见弱口令top200☆14Jan 21, 2022Updated 4 years ago
- A compiler for the Meta Attack Language☆15Apr 11, 2022Updated 3 years ago
- Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.☆16May 21, 2021Updated 4 years ago
- Short deep dive into Threat Hunting on AWS☆17Oct 15, 2023Updated 2 years ago
- Globally distributed honeypots and HoneyNets IOCs and file reversing☆16Apr 22, 2024Updated last year
- ☆54Feb 2, 2026Updated last week
- 用于检测网站是否使用了CDN机制。☆20Sep 19, 2020Updated 5 years ago
- Reduce false-positive alarms via voxel based point cloud analysis.☆22May 6, 2024Updated last year
- ☆25Mar 30, 2022Updated 3 years ago
- Repository of Yara rules created by the Stratosphere team☆29Jul 8, 2021Updated 4 years ago
- A tool to help pentesters quickly identify privileged principals and second-order privilege escalation opportunities in unfamiliar AWS ac…☆142Nov 14, 2025Updated 3 months ago
- ☆27Dec 10, 2021Updated 4 years ago
- ☆35Jan 13, 2026Updated last month
- PackGenome: Automatically Generating Robust YARA Rules for Accurate Malware Packer Detection☆28Dec 6, 2023Updated 2 years ago
- ☆36Jun 10, 2024Updated last year
- Golang parser for OLE files☆33Dec 4, 2025Updated 2 months ago
- SPPNet: An Appoach For Real-Time Encrypted Traffic Classification Using Deep Learning☆10Aug 6, 2024Updated last year
- A repository for a Deep Q-Learning approach to intrusion detection for networks cyber-attacks.☆10Sep 3, 2021Updated 4 years ago
- 安卓远控,天线6.0 无限使用版☆11Sep 9, 2023Updated 2 years ago
- A small How-To on creating your own weaponized WSL file☆119Jul 23, 2025Updated 6 months ago
- ☆36Jan 27, 2026Updated 2 weeks ago
- ☆34Nov 11, 2025Updated 3 months ago
- Yara Rules for Modern Malware☆78Mar 3, 2024Updated last year
- ☆44Feb 26, 2024Updated last year
- Card Payments Simulation Tool For Indie Devs : Core Card Switch Engine, Fraud Engine, ATM/POS GUI Simulator , Admin Dash (Real-time MSG …☆19Jun 15, 2025Updated 8 months ago
- un sensor pour récupérer les informations des prochaines marées☆12Jan 27, 2026Updated 2 weeks ago
- Rules shared by the community from 100 Days of YARA 2025☆38Jan 2, 2026Updated last month
- Offline amnesic live Linux distribution☆14Mar 8, 2025Updated 11 months ago
- Repository of Yara rules dedicated to Phishing Kits Zip files☆234Updated this week
- Github action for linting AWS IAM policy documents☆38Jan 20, 2023Updated 3 years ago
- An easy and efficient tool to build sequential recommendation system utilizing SASRec☆10Nov 1, 2023Updated 2 years ago
- A Docker-based development stack for Bedrock WordPress multisite, optimized for local development, source control, and CI/CD integration.☆13Jun 26, 2025Updated 7 months ago
- Library for extracting fields from Sigtran TCAP/INAP messages☆11Feb 5, 2026Updated last week
- UCAS 数据挖掘课程项目 Option 1: 2020 CCF 大数据与计算智能大赛 风电机组异常数据识别与清洗☆10Aug 15, 2021Updated 4 years ago
- UEFI signing tools for Linux -- Forked to support AWS CloudHSM☆13Aug 25, 2021Updated 4 years ago
- Cybersecurity Ontology (CyberOnto) and Situational Awareness (CyberSA) help teamwork in Cyber Incident Responses, Control, Containment, a…☆10Sep 15, 2022Updated 3 years ago
- The code in this repository which function is to extract the shellcode from the maldoc.☆10Jul 17, 2023Updated 2 years ago