prodaft / malware-iocLinks
This repository contains indicators of compromise (IOCs) of our various investigations.
☆308Updated 2 weeks ago
Alternatives and similar repositories for malware-ioc
Users that are interested in malware-ioc are comparing it to the libraries listed below
Sorting:
- Just some lists of Malware Configs☆173Updated 10 months ago
- ☆379Updated this week
- ☆195Updated last year
- A ProcessMonitor visualization application written in rust.☆184Updated 2 years ago
- ☆147Updated last month
- Jupyter Notebooks for the Blue Team☆148Updated 8 months ago
- ☆513Updated last year
- Automated YARA Rule Standardization and Quality Assurance Tool☆257Updated last week
- Repository of Yara Rules☆128Updated 2 weeks ago
- Signatures and IoCs from public Volexity blog posts.☆359Updated last month
- Different learning materials☆229Updated 2 months ago
- CLI tools for forensic investigation of Windows artifacts☆347Updated 4 months ago
- Purpleteam scripts simulation & Detection - trigger events for SOC detections☆189Updated 11 months ago
- IATelligence is a Python script that will extract the IAT of a PE file and request GPT to get more information about the API and the ATT&…☆369Updated 2 years ago
- MAL-CL (Malicious Command-Line)☆319Updated 2 years ago
- A YARA rules repository continuously updated for monitoring the old and new threats from articles, incidents responses ...☆140Updated 2 years ago
- Collect-MemoryDump - Automated Creation of Windows Memory Snapshots for DFIR☆251Updated 3 weeks ago
- An easy to use PowerShell script to collect memory and disk forensics for DFIR investigations.☆338Updated 2 weeks ago
- ☆212Updated 5 months ago
- A repository of credential stealer formats☆233Updated 5 months ago
- ☆168Updated 2 years ago
- An Archive of Ransomware Notes Past and Present Collected by Zscaler ThreatLabz☆389Updated last week
- Chocolatey packages supporting the analysis environment projects FLARE-VM & Commando VM.☆206Updated last week
- The Threat Actor Profile Guide for CTI Analysts☆115Updated 2 years ago
- Ransomware simulator written in Golang☆453Updated 3 years ago
- Rules shared by the community from 100 Days of YARA 2024☆86Updated 10 months ago
- A python script developed to process Windows memory images based on triage type.☆265Updated last year
- ☆204Updated 2 weeks ago
- Awesome list of keywords and artifacts for Threat Hunting sessions☆616Updated 3 months ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆68Updated last year