pr0xylife / IcedIDLinks
☆33Updated last year
Alternatives and similar repositories for IcedID
Users that are interested in IcedID are comparing it to the libraries listed below
Sorting:
- IOC Collection 2022☆57Updated 2 years ago
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆86Updated 3 years ago
- ☆66Updated 2 years ago
- ☆96Updated 3 months ago
- Linux Evidence Acquisition Framework☆119Updated 10 months ago
- A GUI to query the API of abuse.ch.☆70Updated 3 years ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆105Updated 3 years ago
- Open IOC sharing platform☆60Updated 9 months ago
- Notes and IoCs of fresh malware☆59Updated last year
- Lazarus analysis tools and research report☆56Updated last year
- Slides of my public talks☆56Updated last year
- A C# based tool for analysing malicious OneNote documents☆114Updated 2 years ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆114Updated 3 years ago
- Repository for different Windows DFIR related CMDs, PowerShell CMDlets, etc, plus workshops that I did for different conferences or event…☆78Updated 4 years ago
- Detection rule validation☆41Updated last year
- Simple PowerShell script to enable process scanning with Yara.☆95Updated 2 years ago
- Linux Baseline and Forensic Triage Tool - BETA☆57Updated 2 years ago
- Active C2 IoCs☆99Updated 2 years ago
- Placeholder for my detection repo and misc detection engineering content☆42Updated last year
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆116Updated last year
- Collect-MemoryDump - Automated Creation of Windows Memory Snapshots for DFIR☆245Updated 4 months ago
- A Cobalt Strike Scanner that retrieves detected Team Server beacons into a JSON object☆169Updated 2 years ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆60Updated 2 years ago
- ☆27Updated 4 years ago
- Reads and prints information from the website MalAPI.io☆38Updated 3 years ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆62Updated last year
- Hive v5 file decryption algorithm☆34Updated 2 years ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆146Updated last year
- 100 Days of YARA to be updated with rules & ideas as the year progresses☆60Updated 2 years ago
- ☆68Updated 4 years ago