This repository contains indicators of compromise (IOCs) of our various investigations.
☆314Nov 4, 2025Updated 4 months ago
Alternatives and similar repositories for malware-ioc
Users that are interested in malware-ioc are comparing it to the libraries listed below
Sorting:
- Converts C programs that only use syscalls to 64 bit assembly file.☆12Mar 7, 2021Updated 5 years ago
- Notes for Assembly language☆15Jul 28, 2020Updated 5 years ago
- This repo contain Android malware samples and analysis☆13Apr 3, 2021Updated 4 years ago
- ☆19Mar 31, 2022Updated 3 years ago
- Sentello is python script that simulates the anti-evasion and anti-analysis techniques used by malware.☆75Mar 7, 2021Updated 5 years ago
- ☆512Oct 7, 2024Updated last year
- ☆34Nov 11, 2025Updated 4 months ago
- ☆384Mar 14, 2026Updated last week
- BestRecon is a browser-based recon tool to gather information about your target and analyze their security on browser.☆11Jan 1, 2021Updated 5 years ago
- Statically unpacking common android banker malware.☆160Apr 2, 2025Updated 11 months ago
- ☆29May 1, 2020Updated 5 years ago
- Zippo is a archive payload generator for testing XSS, (Zip/Tar/Gzip) slip vulnerabilities.☆25Feb 26, 2021Updated 5 years ago
- Interesting APT Report Collection And Some Special IOCs☆2,955Updated this week
- Winsock accept() Backdoor Implant.☆118Feb 13, 2021Updated 5 years ago
- For all these times you're asking yourself "what is this panel again?"☆261Jan 29, 2026Updated last month
- A pattern based Dalvik deobfuscator which uses limited execution to improve semantic analysis☆13Mar 22, 2022Updated 4 years ago
- A tool that adds reproducible UUIDs to YARA rules☆13Apr 24, 2024Updated last year
- Signatures and IoCs from public Volexity blog posts.☆366Dec 4, 2025Updated 3 months ago
- ☆21Apr 19, 2024Updated last year
- Collection of rules created using YARA-Signator over Malpedia☆142Jan 6, 2026Updated 2 months ago
- Personal notes and lab results pertaining to the text "Practical Malware Analysis" by Michael Sikorski and Andrew Honiq.☆12Oct 28, 2017Updated 8 years ago
- Indicators of compromise☆17Jan 29, 2026Updated last month
- Awesome list of keywords and artifacts for Threat Hunting sessions☆648Aug 4, 2025Updated 7 months ago
- Subdomain Enumeration Tool☆12Jan 16, 2021Updated 5 years ago
- Just some lists of Malware Configs☆173Jan 9, 2025Updated last year
- A collection of my yara rules☆34Jul 11, 2023Updated 2 years ago
- ☆55Mar 5, 2026Updated 2 weeks ago
- A tool designed to make physical devices detectable by malware and make system look like virtual machine.☆398Sep 13, 2020Updated 5 years ago
- CRADLE is a collaborative platform for Cyber Threat Intelligence analysts. It streamlines threat investigations with integrated note-taki…☆340Mar 15, 2026Updated last week
- qiling framework examples☆16Jan 17, 2022Updated 4 years ago
- A repository of credential stealer formats☆252Jun 10, 2025Updated 9 months ago
- Indicators of Compromise (IOCs) accompanying HP Threat Research blog posts and reports.☆29Apr 10, 2024Updated last year
- This repository is for Indicators of Compromise (IOCs) from Zscaler ThreatLabz public reports☆78Jan 26, 2026Updated last month
- ☆66Jan 27, 2023Updated 3 years ago
- Threat Intel IoCs + bits and pieces of dark matter. Published by Gen Threat Labs.☆437Mar 11, 2026Updated last week
- IOCs collected during day-to-day activities☆114Updated this week
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆121Mar 4, 2026Updated 2 weeks ago
- This repository contains OpenIOC rules to aid in hunting for indicators of compromise and TTPs focused on Advanced Persistent Threat grou…☆26Oct 3, 2023Updated 2 years ago
- a benchmarking&stressing tool that can send raw HTTP requests☆165Sep 24, 2022Updated 3 years ago