prodaft / malware-ioc
This repository contains indicators of compromise (IOCs) of our various investigations.
☆229Updated this week
Alternatives and similar repositories for malware-ioc:
Users that are interested in malware-ioc are comparing it to the libraries listed below
- A ProcessMonitor visualization application written in rust.☆179Updated last year
- ☆195Updated last year
- ☆515Updated 5 months ago
- Just some lists of Malware Configs☆168Updated 2 months ago
- A YARA rules repository continuously updated for monitoring the old and new threats from articles, incidents responses ...☆138Updated last year
- IATelligence is a Python script that will extract the IAT of a PE file and request GPT to get more information about the API and the ATT&…☆358Updated 2 years ago
- An easy to use PowerShell script to collect memory and disk forensics for DFIR investigations.☆278Updated 6 months ago
- ☆200Updated last year
- Jupyter Notebooks for the Blue Team☆145Updated 2 years ago
- ☆122Updated 2 weeks ago
- Chocolatey packages supporting the analysis environment projects FLARE-VM & Commando VM.☆169Updated this week
- Automated YARA Rule Standardization and Quality Assurance Tool☆196Updated this week
- ☆335Updated this week
- MAL-CL (Malicious Command-Line)☆310Updated 2 years ago
- Collect-MemoryDump - Automated Creation of Windows Memory Snapshots for DFIR☆233Updated this week
- A python script developed to process Windows memory images based on triage type.☆260Updated last year
- The Threat Actor Profile Guide for CTI Analysts☆107Updated last year
- ☆130Updated last year
- Purpleteam scripts simulation & Detection - trigger events for SOC detections☆181Updated 2 months ago
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆200Updated 2 years ago
- Collection of malware persistence and hunting information. Be a persistent persistence hunter!☆174Updated last month
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆61Updated last year
- ☆199Updated 4 months ago
- Different learning materials☆224Updated 7 months ago
- Some Threat Hunting queries useful for blue teamers☆125Updated 2 years ago
- MemProcFS-Analyzer - Automated Forensic Analysis of Windows Memory Dumps for DFIR☆590Updated this week
- The Windows Malware Analysis Reversing Core Tools☆91Updated 4 years ago
- IOC Collection 2022☆57Updated 2 years ago
- Active C&C Detector☆152Updated last year
- A guide on how to write fast and memory friendly YARA rules☆141Updated last month