phish-report / IOK
IOK (Indicator Of Kit) is an open source language and ruleset for detecting phishing threat actor tools and tactics
β167Updated 2 weeks ago
Related projects β
Alternatives and complementary repositories for IOK
- Repository of Yara rules dedicated to Phishing Kits Zip filesβ204Updated this week
- π΄ββ οΈπ° Another Ransomware gang trackerβ157Updated this week
- Welcome to the SEKOIA.IO Community repository!β120Updated 2 weeks ago
- Sublime rules for email attack detection, prevention, and threat hunting.β256Updated this week
- Open Source Platform for storing, organizing, and searching documents related to cyber threatsβ157Updated last year
- SOARCA - The Open Source CACAO-based Security Orchestrator!β58Updated this week
- Yet another Ransomware gang trackerβ329Updated this week
- The Threat Actor Profile Guide for CTI Analystsβ97Updated last year
- This repository is for Indicators of Compromise (IOCs) from Zscaler ThreatLabz public reportsβ65Updated this week
- MISP Playbooksβ174Updated last month
- Building a consolidated RSS feed for articles about cyberattacksβ59Updated this week
- Zeek-Formatted Threat Intelligence Feedsβ343Updated this week
- Automated YARA Rule Standardization and Quality Assurance Toolβ166Updated this week
- Cyber Underground General Intelligence Requirementsβ89Updated 9 months ago
- HASH (HTTP Agnostic Software Honeypot)β128Updated 6 months ago
- A collection of files with indicators supporting social media posts from Palo Alto Network's Unit 42 team to disseminate timely threat inβ¦β200Updated this week
- An IDE and translation engine for detection engineers and threat hunters. Be faster, write smarter, keep 100% privacy.β131Updated this week
- An opensource sigma conversion tool built using pysigmaβ100Updated this week
- β83Updated 3 months ago
- LOKI2 - Simple IOC and YARA Scannerβ80Updated 3 months ago
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable reporβ¦β204Updated last year
- Threat Hunting queries for various attacksβ207Updated this week
- Rules generated from our investigations.β189Updated 3 weeks ago
- Purpleteam scripts simulation & Detection - trigger events for SOC detectionsβ158Updated last week
- Vulnerability Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streamlβ¦β136Updated this week
- C2 Active Scannerβ48Updated 5 months ago
- A collection of companies that disclose adversary TTPs after they have been breachedβ241Updated 6 months ago
- Source code used at TweetFeed.liveβ38Updated 2 years ago
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extracβ¦β140Updated 2 months ago
- Curated Windows event log Sigma rules used in Hayabusa and Velociraptor.β144Updated this week