misthi0s / Malware_IOCs
IOCs for various malware families
☆11Updated 2 months ago
Related projects: ⓘ
- Pointer was developed for massive hunting and mapping Cobalt Strike servers exposed on the internet.☆65Updated 2 years ago
- Placeholder for my detection repo and misc detection engineering content☆43Updated 10 months ago
- A small util to brute-force prefetch hashes☆73Updated 2 years ago
- ☆75Updated 3 weeks ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆74Updated 2 years ago
- IOC Collection 2022☆55Updated last year
- yara detection rules for hunting with the threathunting-keywords project☆75Updated last week
- ☆25Updated 3 years ago
- ☆34Updated last year
- Simple PowerShell script to enable process scanning with Yara.☆86Updated last year
- Reads and prints information from the website MalAPI.io☆19Updated 2 years ago
- Default Detections for EDR☆94Updated 6 months ago
- Triaging Windows event logs based on SANS Poster☆37Updated last year
- ☆11Updated 2 years ago
- ShellSweeping the evil.☆49Updated 3 months ago
- ☆34Updated 9 months ago
- Lazarus analysis tools and research report☆54Updated 8 months ago
- Notes and IoCs of fresh malware☆58Updated 2 months ago
- Modular malware analysis artifact collection and correlation framework☆49Updated 4 months ago
- Active C2 IoCs☆96Updated last year
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated last year
- Open IOC sharing platform☆52Updated 11 months ago
- ☆95Updated 6 months ago
- A Cobalt Strike Scanner that retrieves detected Team Server beacons into a JSON object☆162Updated last year
- Yara Rules for Modern Malware☆68Updated 6 months ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆57Updated last year
- A specification and style guide for YARA rules☆34Updated 7 months ago
- Open Dataset of Cobalt Strike Beacon metadata (2018-2022)☆122Updated 2 years ago
- Signature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces!☆80Updated last year
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆104Updated 2 years ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆72Updated 2 years ago