prodaft / malware-iocLinks
This repository contains indicators of compromise (IOCs) of our various investigations.
☆310Updated 3 months ago
Alternatives and similar repositories for malware-ioc
Users that are interested in malware-ioc are comparing it to the libraries listed below
Sorting:
- A ProcessMonitor visualization application written in rust.☆184Updated 2 years ago
- ☆194Updated 2 years ago
- Just some lists of Malware Configs☆173Updated last year
- IATelligence is a Python script that will extract the IAT of a PE file and request GPT to get more information about the API and the ATT&…☆372Updated 3 years ago
- Repository of Yara Rules☆139Updated 3 weeks ago
- ☆152Updated 3 months ago
- ☆513Updated last year
- ☆380Updated this week
- MAL-CL (Malicious Command-Line)☆322Updated 3 years ago
- Automated YARA Rule Standardization and Quality Assurance Tool☆278Updated last week
- ☆173Updated 2 years ago
- A repository of credential stealer formats☆242Updated 7 months ago
- A YARA rules repository continuously updated for monitoring the old and new threats from articles, incidents responses ...☆141Updated 2 years ago
- Purpleteam scripts simulation & Detection - trigger events for SOC detections☆192Updated last year
- Jupyter Notebooks for the Blue Team☆145Updated 10 months ago
- Signatures and IoCs from public Volexity blog posts.☆362Updated 2 months ago
- Different learning materials☆228Updated 4 months ago
- Collect-MemoryDump - Automated Creation of Windows Memory Snapshots for DFIR☆252Updated 3 months ago
- ☆214Updated 2 months ago
- Chocolatey packages supporting the analysis environment projects FLARE-VM & Commando VM.☆215Updated this week
- A python script developed to process Windows memory images based on triage type.☆263Updated 2 years ago
- Ransomware simulator written in Golang☆470Updated 3 years ago
- Free training course offered at Hack Space Con 2023☆138Updated 2 years ago
- A PoC ransomware sample to test out your ransomware response strategy.☆211Updated 2 months ago
- An easy to use PowerShell script to collect memory and disk forensics for DFIR investigations.☆342Updated 2 months ago
- ☆215Updated 8 months ago
- Rules shared by the community from 100 Days of YARA 2024☆89Updated last year
- ☆520Updated 2 years ago
- Collection of resources that are made by the Malware Research community☆236Updated 2 years ago
- An Archive of Ransomware Notes Past and Present Collected by Zscaler ThreatLabz☆400Updated last week