prodaft / malware-iocLinks
This repository contains indicators of compromise (IOCs) of our various investigations.
☆291Updated this week
Alternatives and similar repositories for malware-ioc
Users that are interested in malware-ioc are comparing it to the libraries listed below
Sorting:
- Just some lists of Malware Configs☆172Updated 8 months ago
- ☆374Updated this week
- IATelligence is a Python script that will extract the IAT of a PE file and request GPT to get more information about the API and the ATT&…☆368Updated 2 years ago
- Automated YARA Rule Standardization and Quality Assurance Tool☆241Updated 2 weeks ago
- ☆142Updated last month
- A ProcessMonitor visualization application written in rust.☆184Updated 2 years ago
- ☆197Updated last year
- ☆513Updated 11 months ago
- Different learning materials☆228Updated this week
- Chocolatey packages supporting the analysis environment projects FLARE-VM & Commando VM.☆195Updated last week
- Repository of Yara Rules☆118Updated this week
- An easy to use PowerShell script to collect memory and disk forensics for DFIR investigations.☆331Updated 4 months ago
- Signatures and IoCs from public Volexity blog posts.☆356Updated last week
- ☆212Updated 3 months ago
- Purpleteam scripts simulation & Detection - trigger events for SOC detections☆190Updated 9 months ago
- A YARA rules repository continuously updated for monitoring the old and new threats from articles, incidents responses ...☆138Updated last year
- CLI tools for forensic investigation of Windows artifacts☆347Updated 2 months ago
- An Archive of Ransomware Notes Past and Present Collected by Zscaler ThreatLabz☆378Updated 3 weeks ago
- Jupyter Notebooks for the Blue Team☆146Updated 6 months ago
- Collect-MemoryDump - Automated Creation of Windows Memory Snapshots for DFIR☆248Updated 5 months ago
- ☆160Updated 2 years ago
- A collection of files with indicators supporting social media posts from Palo Alto Network's Unit 42 team to disseminate timely threat in…☆369Updated this week
- Welcome to the SEKOIA.IO Community repository!☆164Updated 2 months ago
- MAL-CL (Malicious Command-Line)☆317Updated 2 years ago
- Awesome list of keywords and artifacts for Threat Hunting sessions☆604Updated last month
- A repository of credential stealer formats☆226Updated 3 months ago
- Gets updates from various clearnet domains and ransomware threat actor domains☆402Updated last year
- Collection of resources that are made by the Malware Research community☆229Updated 2 years ago
- An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.☆199Updated last year
- A collection of methods to learn who the owner of an IP address is.☆172Updated 3 months ago