prodaft / malware-ioc
This repository contains indicators of compromise (IOCs) of our various investigations.
☆248Updated last week
Alternatives and similar repositories for malware-ioc:
Users that are interested in malware-ioc are comparing it to the libraries listed below
- ☆195Updated last year
- ☆515Updated 6 months ago
- ☆127Updated 3 weeks ago
- A ProcessMonitor visualization application written in rust.☆178Updated last year
- Signatures and IoCs from public Volexity blog posts.☆353Updated 2 months ago
- Purpleteam scripts simulation & Detection - trigger events for SOC detections☆184Updated 4 months ago
- IATelligence is a Python script that will extract the IAT of a PE file and request GPT to get more information about the API and the ATT&…☆360Updated 2 years ago
- Just some lists of Malware Configs☆169Updated 3 months ago
- Automated YARA Rule Standardization and Quality Assurance Tool☆210Updated this week
- ☆199Updated last year
- An easy to use PowerShell script to collect memory and disk forensics for DFIR investigations.☆280Updated 8 months ago
- A python script developed to process Windows memory images based on triage type.☆262Updated last year
- CLI tools for forensic investigation of Windows artifacts☆327Updated 5 months ago
- Collect-MemoryDump - Automated Creation of Windows Memory Snapshots for DFIR☆237Updated 3 weeks ago
- A YARA rules repository continuously updated for monitoring the old and new threats from articles, incidents responses ...☆139Updated last year
- MAL-CL (Malicious Command-Line)☆312Updated 2 years ago
- ☆489Updated last year
- Jupyter Notebooks for the Blue Team☆145Updated last month
- Ransomware simulator written in Golang☆433Updated 2 years ago
- Awesome list of keywords and artifacts for Threat Hunting sessions☆563Updated last month
- ☆201Updated 5 months ago
- Repository of Yara Rules☆110Updated last week
- Chocolatey packages supporting the analysis environment projects FLARE-VM & Commando VM.☆175Updated this week
- MemProcFS-Analyzer - Automated Forensic Analysis of Windows Memory Dumps for DFIR☆619Updated last month
- ☆130Updated last year
- Free training course offered at Hack Space Con 2023☆138Updated 2 years ago
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆201Updated 2 years ago
- The goal of this repo is to archive artifacts from all versions of various OS's and categorizing them by type. This will help with artifa…☆596Updated last month
- Automatically created C2 Feeds☆603Updated this week
- ☆66Updated 2 years ago