prodaft / malware-ioc
This repository contains indicators of compromise (IOCs) of our various investigations.
☆249Updated 2 weeks ago
Alternatives and similar repositories for malware-ioc
Users that are interested in malware-ioc are comparing it to the libraries listed below
Sorting:
- A YARA rules repository continuously updated for monitoring the old and new threats from articles, incidents responses ...☆139Updated last year
- ☆195Updated last year
- A ProcessMonitor visualization application written in rust.☆179Updated last year
- ☆130Updated last week
- Automated YARA Rule Standardization and Quality Assurance Tool☆218Updated this week
- Just some lists of Malware Configs☆170Updated 4 months ago
- ☆515Updated 7 months ago
- Collection of resources that are made by the Malware Research community☆225Updated last year
- Purpleteam scripts simulation & Detection - trigger events for SOC detections☆185Updated 4 months ago
- IATelligence is a Python script that will extract the IAT of a PE file and request GPT to get more information about the API and the ATT&…☆361Updated 2 years ago
- Repository of Yara Rules☆110Updated last month
- ☆201Updated last year
- Collect-MemoryDump - Automated Creation of Windows Memory Snapshots for DFIR☆239Updated last month
- MAL-CL (Malicious Command-Line)☆312Updated 2 years ago
- Chocolatey packages supporting the analysis environment projects FLARE-VM & Commando VM.☆177Updated this week
- An easy to use PowerShell script to collect memory and disk forensics for DFIR investigations.☆287Updated last week
- CLI tools for forensic investigation of Windows artifacts☆327Updated 6 months ago
- Ransomware simulator written in Golang☆436Updated 2 years ago
- Jupyter Notebooks for the Blue Team☆144Updated last month
- ☆130Updated last year
- Different learning materials☆226Updated 2 months ago
- ☆201Updated 6 months ago
- ☆362Updated this week
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆202Updated 2 years ago
- ☆247Updated last year
- Signatures and IoCs from public Volexity blog posts.☆354Updated 3 months ago
- 🏴☠️💰 Another Ransomware gang tracker☆197Updated this week
- Free training course offered at Hack Space Con 2023☆138Updated 2 years ago
- Simulate the behavior of AV/EDR for malware development training.☆523Updated last year
- A repository of credential stealer formats☆215Updated last month