Index and collection of MVT compatibile indicators of compromise.
☆124Feb 18, 2026Updated 2 weeks ago
Alternatives and similar repositories for mvt-indicators
Users that are interested in mvt-indicators are comparing it to the libraries listed below
Sorting:
- Unofficial micro-architecture optimized hardened_malloc package☆13Updated this week
- ☆11Jun 12, 2023Updated 2 years ago
- Use Ghidra Structs in Python☆30Mar 28, 2021Updated 4 years ago
- A friendly DNSSEC signing solution: sensible defaults, controllability, observability and flexibility.☆53Updated this week
- NTFS file system specimens☆13Jul 3, 2023Updated 2 years ago
- Fixes crashes of several TV apps (Optimum, Horizon TV, Viaplay) when Xposed is enabled☆13Mar 31, 2014Updated 11 years ago
- PowerShell 'Hero': scripts for DFIR and automation with a PowerShell menu example.☆37Jul 11, 2023Updated 2 years ago
- MVT (Mobile Verification Toolkit) helps with conducting forensics of mobile devices in order to find signs of a potential compromise.☆12,191Updated this week
- This database tracks details about victims of NSO Group’s Pegasus spyware, based on reporting by Amnesty International, Citizen Lab, Forb…☆35Nov 27, 2023Updated 2 years ago
- A tool for performing network timing attacks on plaintext and hashed password authentication.☆21May 30, 2013Updated 12 years ago
- A Python parser for Rich Headers☆15Jun 2, 2015Updated 10 years ago
- Forensic toolkit for iOS sysdiagnose feature☆248Feb 26, 2026Updated last week
- recover Firefox and more browsers logins☆49Nov 23, 2021Updated 4 years ago
- nmap/ndiff based scanner with template based notification system in case of infrastructure changes☆19Feb 16, 2018Updated 8 years ago
- ☆454Feb 24, 2024Updated 2 years ago
- IOCs from Google Threat Intelligence Group☆62Oct 9, 2025Updated 4 months ago
- Capture the flag archives and writeups☆21Oct 26, 2025Updated 4 months ago
- A pure ANSI-C implementation of calculating a SimHash over 4-byte tuples (including multiplicities) for a given byte stream. Simple and r…☆46May 2, 2019Updated 6 years ago
- CLI tool to analyze APKs☆42Mar 28, 2024Updated last year
- ☆19Sep 2, 2018Updated 7 years ago
- ☆21Jun 6, 2023Updated 2 years ago
- Example Suricata rules implementing some of my detection tactics☆22Jan 13, 2023Updated 3 years ago
- A generic security incident response playbook investigating and responding to potential compromises of Okta's internal systems, in the co…☆20Mar 24, 2022Updated 3 years ago
- ☆52Sep 5, 2018Updated 7 years ago
- Raven is a Web application penetration testing tool.☆17Jun 16, 2021Updated 4 years ago
- An experimental Velociraptor implementation using cloud infrastructure☆26Dec 2, 2025Updated 3 months ago
- Repository of tools, YARA rules, and code-snippets from Stairwell's research team.☆23Jan 31, 2024Updated 2 years ago
- Manage Your Large Team of Consultants☆11Sep 18, 2025Updated 5 months ago
- Decompile binary MOF file (BMF) from WMI buffer☆58Apr 16, 2023Updated 2 years ago
- Virus Total Free - IOC parser and report generator☆25Mar 19, 2023Updated 2 years ago
- xlrd2 is a variant of xlrd that is actively maintained☆23Aug 1, 2024Updated last year
- A python library for building and using hash databases.☆22Feb 8, 2023Updated 3 years ago
- (Abandoned) Extract packages from an Android device☆53Apr 9, 2021Updated 4 years ago
- MasterParser is a simple, all-in-one, digital forensics artifact parser☆24Jul 9, 2021Updated 4 years ago
- Evtx Log (xml) Browser☆56Mar 12, 2023Updated 2 years ago
- Repository for Cortex XDR and Cortex XSIAM XQL queries and more!☆41Jun 7, 2024Updated last year
- Indicators of Compromise (IOCs) accompanying HP Threat Research blog posts and reports.☆29Apr 10, 2024Updated last year
- The JSON REST API for the National Vulnerability Database☆24Dec 26, 2022Updated 3 years ago
- Signal database acquisition and decryption.☆32Nov 19, 2022Updated 3 years ago