prodaft / malware-ioc
This repository contains indicators of compromise (IOCs) of our various investigations.
☆214Updated last month
Alternatives and similar repositories for malware-ioc:
Users that are interested in malware-ioc are comparing it to the libraries listed below
- A ProcessMonitor visualization application written in rust.☆176Updated last year
- ☆197Updated last year
- Purpleteam scripts simulation & Detection - trigger events for SOC detections☆171Updated last month
- ☆512Updated 3 months ago
- ☆195Updated 11 months ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆59Updated last year
- IATelligence is a Python script that will extract the IAT of a PE file and request GPT to get more information about the API and the ATT&…☆358Updated 2 years ago
- Just some lists of Malware Configs☆168Updated 3 weeks ago
- ☆196Updated 3 months ago
- An easy to use PowerShell script to collect memory and disk forensics for DFIR investigations.☆274Updated 5 months ago
- A YARA rules repository continuously updated for monitoring the old and new threats from articles, incidents responses ...☆138Updated last year
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆84Updated 2 years ago
- MAL-CL (Malicious Command-Line)☆309Updated 2 years ago
- The Threat Actor Profile Guide for CTI Analysts☆103Updated last year
- A python script developed to process Windows memory images based on triage type.☆261Updated last year
- ☆155Updated last year
- ☆98Updated last week
- Collection of resources that are made by the Malware Research community☆220Updated last year
- Automated YARA Rule Standardization and Quality Assurance Tool☆183Updated this week
- The Windows Malware Analysis Reversing Core Tools☆90Updated 4 years ago
- Signatures and IoCs from public Volexity blog posts.☆345Updated last month
- CLI tools for forensic investigation of Windows artifacts☆322Updated 2 months ago
- Collect-MemoryDump - Automated Creation of Windows Memory Snapshots for DFIR☆223Updated 10 months ago
- ☆130Updated last year
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆199Updated 2 years ago
- Collection of malware persistence and hunting information. Be a persistent persistence hunter!☆172Updated last week
- Rules Shared by the Community from 100 Days of YARA 2023☆77Updated last year
- A C# based tool for analysing malicious OneNote documents☆110Updated last year
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆145Updated 4 months ago
- An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.☆190Updated 6 months ago