phish-report / IOK
IOK (Indicator Of Kit) is an open source language and ruleset for detecting phishing threat actor tools and tactics
☆177Updated this week
Alternatives and similar repositories for IOK:
Users that are interested in IOK are comparing it to the libraries listed below
- Repository of Yara rules dedicated to Phishing Kits Zip files☆213Updated last week
- HASH (HTTP Agnostic Software Honeypot)☆137Updated 11 months ago
- A tool designed to hunt for Phishing Kit source code☆220Updated last year
- 🏴☠️💰 Another Ransomware gang tracker☆186Updated last week
- Sublime rules for email attack detection, prevention, and threat hunting.☆283Updated this week
- Welcome to the SEKOIA.IO Community repository!☆143Updated 2 weeks ago
- Open Source Platform for storing, organizing, and searching documents related to cyber threats☆163Updated last year
- The Threat Actor Profile Guide for CTI Analysts☆106Updated last year
- This repository is for Indicators of Compromise (IOCs) from Zscaler ThreatLabz public reports☆71Updated 4 months ago
- MISP Playbooks☆189Updated last month
- SOARCA - The Open Source CACAO-based Security Orchestrator!☆70Updated this week
- Automated YARA Rule Standardization and Quality Assurance Tool☆200Updated last week
- Building a consolidated RSS feed for articles about cyberattacks☆67Updated this week
- ☆126Updated last month
- Generate list of potential typo squatting domains with domain name permutation engine to feed AIL and other systems.☆85Updated 6 months ago
- Newly registered Domain Monitoring to detect phishing and brand impersonation with subdomain enumeration and source code scraping☆48Updated 2 months ago
- Source code used at TweetFeed.live☆41Updated 2 years ago
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆85Updated 2 years ago
- ☆96Updated 3 months ago
- BlackBerry Threat Research & Intelligence☆98Updated last year
- ☆87Updated last month
- ☆199Updated last year
- Cyber Underground General Intelligence Requirements☆91Updated last year
- Threat Hunting queries for various attacks☆230Updated this week
- Search Engines ADs scanner - spotting malvertising in search engines has never been easier!☆41Updated last week
- A phishing kit collector for scavengers☆199Updated 2 months ago
- Malicious IP source.☆81Updated this week
- A collection of files with indicators supporting social media posts from Palo Alto Network's Unit 42 team to disseminate timely threat in…☆276Updated last week
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆85Updated last year
- Tool to analyze and detect MITM phishing toolkits on the web.☆81Updated 3 years ago