sophoslabs / covid-iocs
Malware, spam, and phishing indicators of compromise that involve the use of COVID-19 or coronavirus in some way
☆32Updated 4 years ago
Alternatives and similar repositories for covid-iocs
Users that are interested in covid-iocs are comparing it to the libraries listed below
Sorting:
- A DNS Sinkhole List for testing purposes. (not for use in production systems) - UUID: 0f90ca2c-4b0a-4fbe-b659-449ab30c4284☆20Updated 4 years ago
- Threat intelligence and threat detection indicators (IOC, IOA)☆52Updated 4 years ago
- ☆39Updated 5 years ago
- Threathunt details for the Solarwinds compromise☆33Updated 3 years ago
- SentinelOne's SACK CVE Fixer☆22Updated 5 years ago
- ☆24Updated last year
- ☆17Updated 6 years ago
- A commercial grade threat intelligence feed thats validated and updated every half hour.☆19Updated 2 years ago
- A few quick recipes for those that do not have much time during the day☆22Updated 6 months ago
- ☆11Updated 4 years ago
- Best practices in threat intelligence☆46Updated 2 years ago
- For storing of the volumes☆4Updated 5 years ago
- Presentation Slides and Video links☆32Updated 3 years ago
- Repository for scripts and tips for "Yara Scan Service"☆20Updated 2 years ago
- Official Black Hat Arsenal Security Tools Repository☆21Updated 7 years ago
- repo for sharing stuff☆16Updated last year
- Passive Network Audit Framework☆32Updated 6 years ago
- Yet-Another-BlueTeam-Repo-YABTR. A Repo for a collection of FREE Blue team tools for both windows and Linux.. Not vendor buy to defend pr…☆2Updated 5 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 3 years ago
- CyberChef update scripts in PowerShell & Bash☆16Updated last year
- OSINT tool to evaluate the trustworthiness of a company☆42Updated 5 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns by leveraging Windows Events and Sys…☆12Updated 8 years ago
- Quick & Dirty DFIR scripts developed by Ebryx DFIR team to keep handy during field assignment☆14Updated 10 months ago
- ☆30Updated 6 years ago
- Send your nessus compliance and vulnerability scan data to ElasticSearch☆28Updated 6 years ago
- Files vetted, and approved for public release☆53Updated last year
- ☆30Updated 8 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Updated last year
- threat-intelligence.eu website and repository of information about open standards, documents, methodologies and processes in threat intel…☆48Updated 2 years ago
- List CVEs and details that apply to your infrastructure (pre-inventoried).☆10Updated 4 years ago