mandiant / iocsLinks
FireEye Publicly Shared Indicators of Compromise (IOCs)
☆465Updated 6 years ago
Alternatives and similar repositories for iocs
Users that are interested in iocs are comparing it to the libraries listed below
Sorting:
- Tool to extract indicators of compromise from security reports in PDF format☆435Updated 2 years ago
- Indicators from Unit 42 Public Reports☆711Updated last week
- 16,432 Free Yara rules created by☆383Updated 6 years ago
- ☆203Updated 2 years ago
- DPS' Lightweight Investigation Notebook☆430Updated last year
- Automatic Yara Rule Generation☆332Updated 9 years ago
- Malware Configuration And Payload Extraction☆757Updated 6 months ago
- Modified edition of cuckoo☆399Updated 7 years ago
- Modular file scanning/analysis framework☆618Updated 5 years ago
- Clusters and elements to attach to MISP events or attributes (like threat actors)☆561Updated this week
- File Scanning Framework☆292Updated 3 years ago
- DC3 Malware Configuration Parser (DC3-MWCP) is a framework for parsing configuration information from malware. The information extracted …☆320Updated 3 months ago
- Threat Report ATT&CK™ Mapping (TRAM) is a tool to aid analyst in mapping finished reports to ATT&CK.☆352Updated 3 years ago
- ☆1,073Updated 6 years ago
- DEPRECATED - USE v3 (bearded-avenger)☆228Updated 7 years ago
- Data from a BRAWL Automated Adversary Emulation Exercise☆206Updated 4 years ago
- A threat hunting / data analysis environment based on Python, Pandas, PySpark and Jupyter Notebook.☆246Updated 3 years ago
- Yara integrated software to handle archive file data.☆310Updated 3 years ago
- Web interface for the Volatility Memory Forensics Framework☆260Updated 7 years ago
- YARA Rules I come across on the internet☆340Updated last year
- The GOSINT framework is a project used for collecting, processing, and exporting high quality indicators of compromise (IOCs).☆544Updated 2 years ago
- Documentation of TheHive☆397Updated last year
- Deception based detection techniques mapped to the MITRE’s ATT&CK framework☆289Updated 7 years ago
- CIF v3 -- the fastest way to consume threat intelligence☆182Updated 2 years ago
- FAME Automates Malware Evaluation☆898Updated last month
- Defanged Indicator of Compromise (IOC) Extractor.☆531Updated 9 months ago
- CRITs - Collaborative Research Into Threats☆902Updated 5 years ago
- A datasource assessment on an event level to show potential coverage or the MITRE ATT&CK framework☆352Updated 4 years ago
- Threat Intelligence APIs☆278Updated last year
- Python library using the MISP Rest API☆463Updated 2 weeks ago