myceliumbroker / jarmLinks
A list of JARM fingerprints from malicious IPs, matched against known C2 fingerprints.
☆12Updated 4 months ago
Alternatives and similar repositories for jarm
Users that are interested in jarm are comparing it to the libraries listed below
Sorting:
- Threat Hunting Malware Infrastructure☆10Updated last year
- C2 Active Scanner☆60Updated last year
- Source code used at TweetFeed.live☆46Updated 2 years ago
- Suricata Language Server is an implementation of the Language Server Protocol for Suricata signatures. It adds syntax check, hints and au…☆79Updated 3 months ago
- DGA Detective - Hunt domains generated by Domain Generation Algorithms to identify malware traffic☆45Updated last year
- ☆34Updated this week
- Welcome to the SEKOIA.IO Community repository!☆164Updated 2 months ago
- ☆33Updated this week
- This repository contains a comprehensive list of over 30k dynamic DNS domains as of 2024. The list is provided for informational purposes…☆107Updated this week
- ☆96Updated 5 months ago
- ☆15Updated last month
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆87Updated 3 years ago
- yara detection rules for hunting with the threathunting-keywords project☆150Updated 5 months ago
- A library and command line tool for extracting indicators of compromise (IOCs) from security reports in PDF, HTML, Word, or text format☆43Updated 3 weeks ago
- Lightweight Python-Based Malware Analysis Pipeline☆35Updated 3 weeks ago
- Collection of rules created using YARA-Signator over Malpedia☆137Updated 11 months ago
- pyJARM is a library for doing JARM fingerprinting using python☆50Updated 6 months ago
- Zeek Extension to Collect Metadata for Profiling of Endpoints and Proxies☆37Updated last month
- ☆52Updated last month
- IOCs for various malware families☆11Updated last year
- File analysis and management framework.☆88Updated 2 years ago
- Repository of Yara rules dedicated to Phishing Kits Zip files☆231Updated 3 weeks ago
- YaraScanner is a file pattern-matching tool based on YARA rules.☆58Updated 2 years ago
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆116Updated last year
- Cyber Threat Intelligence Data, Indicators, and Analysis☆97Updated 2 months ago
- Visually inspect and force decode YARA and regex matches found in both binary and text data with colors. Lots of colors.☆140Updated 3 weeks ago
- A list of JARM hashes for different ssl implementations used by some C2/red team tools.☆144Updated 2 years ago
- A toolkit for the post-mortem examination of Docker containers from forensic HDD copies☆104Updated last year
- Packet captures of malicious traffic for analysis using Wireshark☆61Updated 2 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago