phish-report / IOK
IOK (Indicator Of Kit) is an open source language and ruleset for detecting phishing threat actor tools and tactics
β176Updated last month
Alternatives and similar repositories for IOK:
Users that are interested in IOK are comparing it to the libraries listed below
- Repository of Yara rules dedicated to Phishing Kits Zip filesβ211Updated last month
- π΄ββ οΈπ° Another Ransomware gang trackerβ179Updated this week
- MISP Playbooksβ186Updated 2 weeks ago
- Newly registered Domain Monitoring to detect phishing and brand impersonation with subdomain enumeration and source code scrapingβ48Updated last month
- Open Source Platform for storing, organizing, and searching documents related to cyber threatsβ162Updated last year
- Threat Hunting queries for various attacksβ228Updated this week
- The Threat Actor Profile Guide for CTI Analystsβ104Updated last year
- Curated Windows event log Sigma rules used in Hayabusa and Velociraptor.β163Updated this week
- A tool designed to hunt for Phishing Kit source codeβ219Updated last year
- Welcome to the SEKOIA.IO Community repository!β142Updated 3 weeks ago
- β96Updated 2 months ago
- β125Updated last week
- Building a consolidated RSS feed for articles about cyberattacksβ66Updated this week
- Automated YARA Rule Standardization and Quality Assurance Toolβ193Updated this week
- Sublime rules for email attack detection, prevention, and threat hunting.β276Updated this week
- Source code used at TweetFeed.liveβ41Updated 2 years ago
- This repository is for Indicators of Compromise (IOCs) from Zscaler ThreatLabz public reportsβ70Updated 3 months ago
- C2 Active Scanner