phish-report / IOKLinks
IOK (Indicator Of Kit) is an open source language and ruleset for detecting phishing threat actor tools and tactics
☆185Updated 2 months ago
Alternatives and similar repositories for IOK
Users that are interested in IOK are comparing it to the libraries listed below
Sorting:
- Repository of Yara rules dedicated to Phishing Kits Zip files☆224Updated 2 weeks ago
- Building a consolidated RSS feed for articles about cyberattacks☆68Updated this week
- 🏴☠️💰 Another Ransomware gang tracker☆214Updated this week
- Open Source Platform for storing, organizing, and searching documents related to cyber threats☆165Updated last year
- Welcome to the SEKOIA.IO Community repository!☆157Updated last week
- Newly registered Domain Monitoring to detect phishing and brand impersonation with subdomain enumeration and source code scraping☆51Updated 5 months ago
- This repository is for Indicators of Compromise (IOCs) from Zscaler ThreatLabz public reports☆73Updated 7 months ago
- Sublime rules for email attack detection, prevention, and threat hunting.☆311Updated this week
- The Threat Actor Profile Guide for CTI Analysts☆107Updated last year
- Threat Hunting queries for various attacks☆237Updated this week
- MISP Playbooks☆203Updated 2 weeks ago
- Zeek-Formatted Threat Intelligence Feeds☆370Updated this week
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆256Updated 3 months ago
- A tool designed to hunt for Phishing Kit source code☆222Updated 2 years ago
- A phishing kit collector for scavengers☆215Updated 2 weeks ago
- This repository contains Malicious Indicator of Compromise (IOC) data, which is vital for cybersecurity professionals to enhance threat d…☆98Updated this week
- Russia / Ukraine 2022 conflict related IOCs from CERT Orange Cyberdefense Threat Intelligence Datalake☆175Updated 2 years ago
- ☆92Updated last month
- ☆204Updated 3 weeks ago
- SOARCA - The Open Source CACAO-based Security Orchestrator!☆76Updated this week
- HASH (HTTP Agnostic Software Honeypot)☆138Updated last year
- ☆143Updated 3 weeks ago
- A collection of companies that disclose adversary TTPs after they have been breached☆244Updated last year
- Rules generated from our investigations.☆195Updated last week
- BlackBerry Threat Research & Intelligence☆98Updated last year
- The principal objective of this project is to develop a knowledge base of the tactics, techniques, and procedures (TTPs) used by insiders…☆144Updated last month
- Source code used at TweetFeed.live☆42Updated 2 years ago
- Roota is a public-domain language of threat detection and response that combines native queries from a SIEM, EDR, XDR, or Data Lake with …☆128Updated 11 months ago
- Search Engines ADs scanner - spotting malvertising in search engines has never been easier!☆43Updated this week
- This guide describes a process for developing Cyber Threat Intelligence Priority Intelligence Requirements☆122Updated last year