mandiant / iocsLinks
FireEye Publicly Shared Indicators of Compromise (IOCs)
☆467Updated 6 years ago
Alternatives and similar repositories for iocs
Users that are interested in iocs are comparing it to the libraries listed below
Sorting:
- Tool to extract indicators of compromise from security reports in PDF format☆436Updated 2 years ago
- Indicators from Unit 42 Public Reports☆715Updated last month
- CRITs - Collaborative Research Into Threats☆904Updated 5 years ago
- Modified edition of cuckoo☆402Updated 7 years ago
- 16,432 Free Yara rules created by☆384Updated 6 years ago
- ☆203Updated 2 years ago
- Malware Configuration And Payload Extraction☆760Updated 7 months ago
- Web interface for the Volatility Memory Forensics Framework☆259Updated 7 years ago
- Automatic Yara Rule Generation☆332Updated 9 years ago
- DPS' Lightweight Investigation Notebook☆432Updated last year
- Clusters and elements to attach to MISP events or attributes (like threat actors)☆566Updated last week
- FAME Automates Malware Evaluation☆899Updated 2 months ago
- Threat Report ATT&CK™ Mapping (TRAM) is a tool to aid analyst in mapping finished reports to ATT&CK.☆352Updated 3 years ago
- Modular file scanning/analysis framework☆619Updated 5 years ago
- Protocol Analysis/Decoder Framework☆493Updated 2 years ago
- File Scanning Framework☆293Updated 3 years ago
- ☆1,074Updated 6 years ago
- DC3 Malware Configuration Parser (DC3-MWCP) is a framework for parsing configuration information from malware. The information extracted …☆323Updated 4 months ago
- Deception based detection techniques mapped to the MITRE’s ATT&CK framework☆289Updated 7 years ago
- Data from a BRAWL Automated Adversary Emulation Exercise☆207Updated 4 years ago
- CIF v3 -- the fastest way to consume threat intelligence☆182Updated 2 years ago
- DEPRECATED - USE v3 (bearded-avenger)☆228Updated 7 years ago
- CRITs Services Collection☆184Updated 4 years ago
- ☆277Updated 2 years ago
- ☆131Updated 4 years ago
- Repository of modules and signatures contributed by the community☆328Updated 2 years ago
- Honeypot Intelligence with Splunk☆254Updated 6 years ago
- Collect, Process, and Hunt with host based data from MacOS, Windows, and Linux☆499Updated 2 years ago
- Web App for Volatility framework☆381Updated 6 months ago
- YARA Rules I come across on the internet☆341Updated last year