prodaft / malware-ioc
This repository contains indicators of compromise (IOCs) of our various investigations.
☆207Updated 6 months ago
Related projects ⓘ
Alternatives and complementary repositories for malware-ioc
- A YARA rules repository continuously updated for monitoring the old and new threats from articles, incidents responses ...☆138Updated last year
- ☆190Updated last year
- An easy to use PowerShell script to collect memory and disk forensics for DFIR investigations.☆270Updated 2 months ago
- Collect-MemoryDump - Automated Creation of Windows Memory Snapshots for DFIR☆220Updated 8 months ago
- A ProcessMonitor visualization application written in rust.☆176Updated last year
- ☆194Updated 9 months ago
- Signatures and IoCs from public Volexity blog posts.☆320Updated this week
- ☆130Updated 9 months ago
- MAL-CL (Malicious Command-Line)☆308Updated last year
- Jupyter Notebooks for the Blue Team☆141Updated last year
- ☆92Updated this week
- ☆505Updated last month
- IATelligence is a Python script that will extract the IAT of a PE file and request GPT to get more information about the API and the ATT&…☆351Updated last year
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆194Updated 2 years ago
- Arya is a unique tool that produces pseudo-malicious files meant to trigger YARA rules. You can think of it like a reverse YARA.☆240Updated last year
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆81Updated 2 years ago
- A python script developed to process Windows memory images based on triage type.☆258Updated 11 months ago
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆110Updated 11 months ago
- The Windows Malware Analysis Reversing Core Tools☆89Updated 3 years ago
- IOC Collection 2022☆55Updated last year
- This repo is a collection of Ransomware reports from vendors, researchers, etc.☆111Updated 2 years ago
- Rules Shared by the Community from 100 Days of YARA 2023☆78Updated last year
- Just some lists of Malware Configs☆159Updated last month
- ☆192Updated last month
- Chocolatey packages supporting the analysis environment projects FLARE-VM & Commando VM.☆146Updated this week
- Some Threat Hunting queries useful for blue teamers☆123Updated 2 years ago
- Rules generated from our investigations.☆189Updated 3 weeks ago
- ☆187Updated 3 weeks ago
- ☆155Updated 11 months ago
- Automated YARA Rule Standardization and Quality Assurance Tool☆166Updated this week