Indicators of Compromise (IOCs) from malware or suspicious network traffic
☆146Feb 3, 2026Updated 3 months ago
Alternatives and similar repositories for indicators
Users that are interested in indicators are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Draugnet is a lightweight, open-source tool for anonymous cyber threat reporting. Built for the MISP ecosystem, it lets users submit and …☆20Mar 24, 2026Updated last month
- Awesome List of Enterprise Security Tools' Community Edition☆16Nov 10, 2023Updated 2 years ago
- Deobfuscate obfuscated python files (WIP)☆23Aug 18, 2019Updated 6 years ago
- Web interface for monitoring and interacting with Netflow data stored in Silk repositories.☆13Mar 24, 2019Updated 7 years ago
- Python script for carving Bitlocker VMK keys☆26Feb 4, 2026Updated 3 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Decloak Linux stealth rootkits hiding data with this simple memory mapped IO investigation tool.☆29Sep 29, 2025Updated 7 months ago
- Writeups for Vulnhub, Tryhackme and Others☆13Jun 25, 2023Updated 2 years ago
- CISSP Studies☆22Aug 5, 2025Updated 9 months ago
- ☆14Apr 12, 2024Updated 2 years ago
- Python3 script to quickly get various information from a domain controller through his LDAP service.☆11Feb 23, 2022Updated 4 years ago
- Yet another awesome fuzzers list☆15Oct 25, 2024Updated last year
- PoC collection☆13Oct 1, 2020Updated 5 years ago
- CipherRun is an ethical hacking tool used to execute shellcode easily while bypassing antivirus solutions.☆11Jan 30, 2024Updated 2 years ago
- Pythonic way to work with the warning lists defined there: https://github.com/MISP/misp-warninglists☆36Jan 8, 2026Updated 3 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- The Android app for scanning GSM networks with OsmocomBB-compatible phones☆14Feb 24, 2021Updated 5 years ago
- KitsuneC2 is a cross-platform adversary emulation tool written in Go.☆12Oct 25, 2024Updated last year
- Windows Shell Link (LNK) Proof of Concept☆16Jul 19, 2025Updated 9 months ago
- Supply Chain Security Research - Attack Trees☆10Jan 9, 2023Updated 3 years ago
- Maintains backlink structure among interlinked Markdown notes☆11Dec 28, 2020Updated 5 years ago
- Collection of YARA rules designed for usage through VirusTotal.com.☆88Apr 4, 2024Updated 2 years ago
- Random tips and tricks RE: ransomware☆14Aug 17, 2021Updated 4 years ago
- Minimalistic port-spoofer written in Python☆11Jan 9, 2025Updated last year
- ☆12Feb 8, 2023Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆10Oct 17, 2020Updated 5 years ago
- Repo for experimenting and testing MCP server builds for CTI-related research.☆27May 13, 2025Updated 11 months ago
- Cryptanalysis of a proprietary 1999 video DRM system. Recovers 61 encrypted wrestling videos from the WCW Internet Powerdisk CD-ROM throu…☆25Jan 29, 2026Updated 3 months ago
- service to convert nfcapd files clickhouse as they are created☆10Mar 22, 2025Updated last year
- Documentation, U-Boot and OpenWRT ports for a low-cost MT02 repeater.☆17Apr 3, 2026Updated last month
- LLM Agent Skill for YARA rule authoring and review☆53Feb 8, 2026Updated 2 months ago
- NoDelete is a tool that assists in malware analysis by locking a folder where malware drops files before deleting them.☆49Nov 17, 2025Updated 5 months ago
- Red Team Coin for crypto-mining operations.☆24Mar 1, 2026Updated 2 months ago
- ☆126Mar 27, 2024Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- AIL project training materials☆39Apr 21, 2026Updated 2 weeks ago
- Cheat sheets for threat hunting, detection and other stuff.☆34Oct 7, 2022Updated 3 years ago
- Hacking-Lab 2.0 OpenVPN Client Configuration OST.CH DC☆22Jun 20, 2025Updated 10 months ago
- Open source configurator for the Zuoya GMK87 keyboard. Upload display images, configure RGB lighting, and sync time via USB HID. Inclu…☆21Mar 24, 2026Updated last month
- My set of notes and resources for Microsoft and other exams☆15Oct 20, 2021Updated 4 years ago
- MISP to Microsoft Defender integration☆17Feb 24, 2026Updated 2 months ago
- EMR Advisor uses Spark Event Logs to generate insights and costs/runtime recommendations using different deployment options for Amazon EM…☆17Jun 5, 2025Updated 11 months ago