A library and command line tool for extracting indicators of compromise (IOCs) from security reports in PDF, HTML, Word, or text format
☆53Mar 20, 2026Updated last month
Alternatives and similar repositories for iocsearcher
Users that are interested in iocsearcher are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Summarize CTI reports with OpenAI☆18Updated this week
- Powershell Functions to interact with TheHive-Project☆11Jun 27, 2019Updated 6 years ago
- A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports☆32Aug 21, 2023Updated 2 years ago
- Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.☆16May 21, 2021Updated 4 years ago
- Short deep dive into Threat Hunting on AWS☆19Oct 15, 2023Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆28Dec 10, 2021Updated 4 years ago
- ☆31Feb 28, 2025Updated last year
- ☆26Apr 28, 2026Updated last week
- ☆57Apr 16, 2026Updated 3 weeks ago
- Repository of Yara rules created by the Stratosphere team☆29Jul 8, 2021Updated 4 years ago
- 布谷鸟异构图构建,对比学习☆11Jun 1, 2022Updated 3 years ago
- Intro To CTF In Arabic☆17Aug 3, 2020Updated 5 years ago
- Reduce false-positive alarms via voxel based point cloud analysis.☆22May 6, 2024Updated 2 years ago
- A collection of powershell scripts that are designed to be ran from a Microsoft Defender for Endpoint Live Response terminal, utilizing o…☆12Apr 26, 2023Updated 3 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆46Feb 26, 2024Updated 2 years ago
- 我的远程连接一键部署工具。☆10May 4, 2023Updated 3 years ago
- Yara Rules for Modern Malware☆80Mar 3, 2024Updated 2 years ago
- An SSH honeypot written entirely in Go.☆14Dec 4, 2025Updated 5 months ago
- JSON schema representation of Stucco ontology☆19Apr 14, 2016Updated 10 years ago
- No longer maintained. Please refer to Google Threat Intelligence / Virus Total collections.☆64Apr 3, 2026Updated last month
- Rapports techniques de VIGINUM☆36Sep 15, 2025Updated 7 months ago
- ☆34Apr 29, 2026Updated last week
- LILO based Pulse Secure appliance disk image decryptor☆13Mar 20, 2024Updated 2 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Repository of Yara rules dedicated to Phishing Kits Zip files☆239Apr 8, 2026Updated last month
- ☆30May 1, 2025Updated last year
- Indicators of compromise☆17Jan 29, 2026Updated 3 months ago
- ☆12Feb 22, 2023Updated 3 years ago
- ☆17Apr 10, 2015Updated 11 years ago
- Avocado is a powerful C2 framework written in Python with stageless implants in Rust. Avocado's implant runs seamlessly on both Linux and…☆27Feb 15, 2026Updated 2 months ago
- Cobalt Strike DNS beacon parser☆11Nov 29, 2021Updated 4 years ago
- Help deobfuscate VBScript☆18Jul 1, 2022Updated 3 years ago
- Cyber Threats Detection Rules☆14Sep 16, 2025Updated 7 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Safe and performant YARA rules evaluator in Rust☆67May 1, 2026Updated last week
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆69Dec 27, 2023Updated 2 years ago
- version 2 of the Unified Cybersecurity Ontology☆16May 7, 2017Updated 9 years ago
- A tool to help pentesters quickly identify privileged principals and second-order privilege escalation opportunities in unfamiliar AWS ac…☆155Nov 14, 2025Updated 5 months ago
- Encode and decode 26-bit, 34-bit, or 38-bit Wiegand protocol credentials for communicating with access control systems in TypeScript or J…☆12Sep 3, 2024Updated last year
- ☆19Apr 16, 2026Updated 3 weeks ago
- ☆35Jan 13, 2026Updated 3 months ago