Indicators of Compromise (IOCs) from malware or suspicious network traffic
☆130Feb 3, 2026Updated last month
Alternatives and similar repositories for indicators
Users that are interested in indicators are comparing it to the libraries listed below
Sorting:
- Repo for experimenting and testing MCP server builds for CTI-related research.☆27May 13, 2025Updated 9 months ago
- ☆22Jan 12, 2024Updated 2 years ago
- Decloak Linux stealth rootkits hiding data with this simple memory mapped IO investigation tool.☆29Sep 29, 2025Updated 5 months ago
- Pythonic way to work with the warning lists defined there: https://github.com/MISP/misp-warninglists☆35Jan 8, 2026Updated last month
- ☆35Jan 13, 2026Updated last month
- Suricata rule and intel index☆33Jan 13, 2026Updated last month
- ☆125Mar 27, 2024Updated last year
- SPPNet: An Appoach For Real-Time Encrypted Traffic Classification Using Deep Learning☆10Aug 6, 2024Updated last year
- 安卓远控,天线6.0 无限使用版☆11Sep 9, 2023Updated 2 years ago
- Cheat sheets for threat hunting, detection and other stuff.☆34Oct 7, 2022Updated 3 years ago
- AIL project training materials☆39Feb 24, 2026Updated last week
- Collection of Docker honeypot logs from 2021 - 2024☆36Sep 30, 2024Updated last year
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆43Jan 20, 2026Updated last month
- Maintains backlink structure among interlinked Markdown notes☆11Dec 28, 2020Updated 5 years ago
- Writeups for Vulnhub, Tryhackme and Others☆13Jun 25, 2023Updated 2 years ago
- Scripts and things.☆13Jan 23, 2026Updated last month
- Offline amnesic live Linux distribution☆14Mar 8, 2025Updated 11 months ago
- KitsuneC2 is a cross-platform adversary emulation tool written in Go.☆12Oct 25, 2024Updated last year
- TAXII 2.0 Server implemented in Node JS with MongoDB backend☆12Jan 3, 2023Updated 3 years ago
- Pure python parser for Snort/Suricata rules.☆34Mar 13, 2024Updated last year
- un sensor pour récupérer les informations des prochaines marées☆12Jan 27, 2026Updated last month
- Volatility, on Docker 🐳☆41Nov 20, 2025Updated 3 months ago
- This is a repository to experiment with MCP for security☆47Jan 22, 2025Updated last year
- ☆44Nov 28, 2025Updated 3 months ago
- UCAS 数据挖掘课程项目 Option 1: 2020 CCF 大数据与计算智能大赛 风电机组异常数据识别与清洗☆10Aug 15, 2021Updated 4 years ago
- MISP to Microsoft Defender integration☆16Feb 24, 2026Updated last week
- service to convert nfcapd files clickhouse as they are created☆10Mar 22, 2025Updated 11 months ago
- 计算概论大作业,Qt,猫捉老鼠小游戏☆12Jan 15, 2019Updated 7 years ago
- In this training will be covered about a very basic step for malware analysis. Using several free tools to recognize malware behavior. Si…☆12May 25, 2016Updated 9 years ago
- 图片炫酷动画展示 在线演示https://hanruto.github.io/image-show/imageCss.html☆12Feb 18, 2017Updated 9 years ago
- Replication files for arXiv:1805.03735 Sequence Aggregation Rules for Anomaly Detection in Computer Network Traffic☆11Jan 6, 2019Updated 7 years ago
- Library for extracting fields from Sigtran TCAP/INAP messages☆11Feb 17, 2026Updated 2 weeks ago
- ☆13Jul 29, 2025Updated 7 months ago
- This is repo with my custom zsh completion files for pentesting tools, which do not exist in zsh and oh-my-zsh by default☆12Oct 23, 2025Updated 4 months ago
- ☆22Aug 29, 2025Updated 6 months ago
- A simple tool designed to create Atomic Red Team tests with ease.☆49Mar 11, 2025Updated 11 months ago
- Code for Benchmarking two ML Approaches performing Authorship Attribution☆43Apr 5, 2022Updated 3 years ago
- NoDelete is a tool that assists in malware analysis by locking a folder where malware drops files before deleting them.☆49Nov 17, 2025Updated 3 months ago
- Draugnet is a lightweight, open-source tool for anonymous cyber threat reporting. Built for the MISP ecosystem, it lets users submit and …☆20Updated this week