prodaft / malware-iocLinks
This repository contains indicators of compromise (IOCs) of our various investigations.
☆310Updated 2 months ago
Alternatives and similar repositories for malware-ioc
Users that are interested in malware-ioc are comparing it to the libraries listed below
Sorting:
- ☆194Updated last year
- IATelligence is a Python script that will extract the IAT of a PE file and request GPT to get more information about the API and the ATT&…☆371Updated 3 years ago
- Just some lists of Malware Configs☆173Updated last year
- ☆380Updated 2 weeks ago
- ☆151Updated 3 months ago
- A ProcessMonitor visualization application written in rust.☆184Updated 2 years ago
- ☆513Updated last year
- Signatures and IoCs from public Volexity blog posts.☆362Updated last month
- ☆215Updated 7 months ago
- MAL-CL (Malicious Command-Line)☆322Updated 3 years ago
- Repository of Yara Rules☆138Updated last week
- A YARA rules repository continuously updated for monitoring the old and new threats from articles, incidents responses ...☆141Updated 2 years ago
- Chocolatey packages supporting the analysis environment projects FLARE-VM & Commando VM.☆212Updated last week
- A repository of credential stealer formats☆239Updated 7 months ago
- Jupyter Notebooks for the Blue Team☆145Updated 10 months ago
- An Archive of Ransomware Notes Past and Present Collected by Zscaler ThreatLabz☆395Updated last week
- Purpleteam scripts simulation & Detection - trigger events for SOC detections☆192Updated last year
- Different learning materials☆228Updated 4 months ago
- Collect-MemoryDump - Automated Creation of Windows Memory Snapshots for DFIR☆252Updated 3 months ago
- Automated YARA Rule Standardization and Quality Assurance Tool☆271Updated this week
- A centralized and enhanced memory analysis platform☆514Updated 6 months ago
- ☆172Updated 2 years ago
- CLI tools for forensic investigation of Windows artifacts☆349Updated 6 months ago
- Gets updates from various clearnet domains and ransomware threat actor domains☆414Updated last year
- An easy to use PowerShell script to collect memory and disk forensics for DFIR investigations.☆342Updated last month
- ☆213Updated last month
- Collection of resources that are made by the Malware Research community☆235Updated 2 years ago
- Leaked communication of Conti ransomware group from Jan 29, 2021 to Feb 27, 2022☆133Updated 3 years ago
- A python script developed to process Windows memory images based on triage type.☆263Updated 2 years ago
- The Windows Malware Analysis Reversing Core Tools☆97Updated 5 years ago