prodaft / malware-iocLinks
This repository contains indicators of compromise (IOCs) of our various investigations.
☆294Updated last week
Alternatives and similar repositories for malware-ioc
Users that are interested in malware-ioc are comparing it to the libraries listed below
Sorting:
- ☆195Updated last year
- Just some lists of Malware Configs☆172Updated 9 months ago
- ☆513Updated last year
- ☆376Updated last week
- ☆147Updated last week
- MAL-CL (Malicious Command-Line)☆319Updated 2 years ago
- A YARA rules repository continuously updated for monitoring the old and new threats from articles, incidents responses ...☆140Updated last year
- A ProcessMonitor visualization application written in rust.☆184Updated 2 years ago
- Collect-MemoryDump - Automated Creation of Windows Memory Snapshots for DFIR☆248Updated this week
- Automated YARA Rule Standardization and Quality Assurance Tool☆253Updated this week
- IATelligence is a Python script that will extract the IAT of a PE file and request GPT to get more information about the API and the ATT&…☆367Updated 2 years ago
- Purpleteam scripts simulation & Detection - trigger events for SOC detections☆189Updated 10 months ago
- Signatures and IoCs from public Volexity blog posts.☆359Updated 3 weeks ago
- An easy to use PowerShell script to collect memory and disk forensics for DFIR investigations.☆335Updated 2 weeks ago
- ☆211Updated 4 months ago
- ☆203Updated last year
- Jupyter Notebooks for the Blue Team☆147Updated 7 months ago
- Chocolatey packages supporting the analysis environment projects FLARE-VM & Commando VM.☆204Updated this week
- Repository of Yara Rules☆123Updated last month
- Gets updates from various clearnet domains and ransomware threat actor domains☆405Updated last year
- A python script developed to process Windows memory images based on triage type.☆265Updated last year
- Rules shared by the community from 100 Days of YARA 2024☆86Updated 10 months ago
- The Threat Actor Profile Guide for CTI Analysts☆115Updated 2 years ago
- The Windows Malware Analysis Reversing Core Tools☆96Updated 4 years ago
- CLI tools for forensic investigation of Windows artifacts☆346Updated 3 months ago
- IOC Collection 2022☆57Updated 2 years ago
- Different learning materials☆228Updated last month
- An Archive of Ransomware Notes Past and Present Collected by Zscaler ThreatLabz☆386Updated 2 weeks ago
- Awesome list of keywords and artifacts for Threat Hunting sessions☆611Updated 2 months ago
- ☆131Updated last year