myceliumbroker / jarmLinks
A list of JARM fingerprints from malicious IPs, matched against known C2 fingerprints.
☆12Updated 5 months ago
Alternatives and similar repositories for jarm
Users that are interested in jarm are comparing it to the libraries listed below
Sorting:
- C2 Active Scanner☆60Updated last year
- Source code used at TweetFeed.live☆47Updated 3 years ago
- ☆34Updated last week
- Threat Hunting Malware Infrastructure☆10Updated last year
- Suricata Language Server is an implementation of the Language Server Protocol for Suricata signatures. It adds syntax check, hints and au…☆81Updated last week
- Lightweight Python-Based Malware Analysis Pipeline☆36Updated 2 months ago
- ☆96Updated 6 months ago
- ☆33Updated last month
- yara detection rules for hunting with the threathunting-keywords project☆153Updated 6 months ago
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆118Updated last year
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆87Updated 3 years ago
- Welcome to the SEKOIA.IO Community repository!☆167Updated 2 weeks ago
- Collection of rules created using YARA-Signator over Malpedia☆141Updated last year
- A list of JARM hashes for different ssl implementations used by some C2/red team tools.☆144Updated 2 years ago
- pySigma Elasticsearch backend☆54Updated last month
- DGA Detective - Hunt domains generated by Domain Generation Algorithms to identify malware traffic☆45Updated last year
- Generate list of potential typo squatting domains with domain name permutation engine to feed AIL and other systems.☆100Updated 6 months ago
- Packet captures of malicious traffic for analysis using Wireshark☆62Updated 2 years ago
- IOCs for various malware families☆11Updated last year
- YARA rule metadata specification and validation utility / Spécification et validation pour les règles YARA☆109Updated 6 months ago
- A library and command line tool for extracting indicators of compromise (IOCs) from security reports in PDF, HTML, Word, or text format☆46Updated last week
- Repository of Yara rules dedicated to Phishing Kits Zip files☆233Updated last month
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆141Updated 9 months ago
- ☆147Updated last month
- This repository is for Indicators of Compromise (IOCs) from Zscaler ThreatLabz public reports☆75Updated 4 months ago
- Active C2 IoCs☆99Updated 2 years ago
- ☆15Updated 3 weeks ago
- Assemblyline 4 Malware detonation service (Cuckoo)☆17Updated last year
- Rules Shared by the Community from 100 Days of YARA 2023☆78Updated 2 years ago
- IOCs published by Black Lotus Labs☆124Updated 3 weeks ago