t4d / PhishingKit-Yara-RulesLinks
Repository of Yara rules dedicated to Phishing Kits Zip files
☆223Updated last week
Alternatives and similar repositories for PhishingKit-Yara-Rules
Users that are interested in PhishingKit-Yara-Rules are comparing it to the libraries listed below
Sorting:
- IOK (Indicator Of Kit) is an open source language and ruleset for detecting phishing threat actor tools and tactics☆184Updated last month
- Welcome to the SEKOIA.IO Community repository!☆157Updated this week
- This repository contains Malicious Indicator of Compromise (IOC) data, which is vital for cybersecurity professionals to enhance threat d…☆96Updated this week
- Open Source Platform for storing, organizing, and searching documents related to cyber threats☆165Updated last year
- The Threat Actor Profile Guide for CTI Analysts☆107Updated last year
- Yara scan Phishing Kit's Zip archive(s)☆59Updated last year
- ☆96Updated last month
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆114Updated last year
- ☆196Updated last year
- ☆131Updated 3 weeks ago
- Exposing phishing kits seen from phishunt.io☆246Updated last week
- 🏴☠️💰 Another Ransomware gang tracker☆211Updated last week
- Collection of rules created using YARA-Signator over Malpedia☆130Updated 7 months ago
- ☆204Updated 2 weeks ago
- A phishing kit collector for scavengers☆214Updated 2 weeks ago
- Automated YARA Rule Standardization and Quality Assurance Tool☆225Updated this week
- This repository is for Indicators of Compromise (IOCs) from Zscaler ThreatLabz public reports☆73Updated 7 months ago
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆86Updated 3 years ago
- BlackBerry Threat Research & Intelligence☆98Updated last year
- Live forensic artifacts collector☆167Updated 11 months ago
- A YARA rules repository continuously updated for monitoring the old and new threats from articles, incidents responses ...☆139Updated last year
- IOC Collection 2022☆57Updated 2 years ago
- acquire is a tool to quickly gather forensic artifacts from disk images or a live system into a lightweight container.☆104Updated this week
- Just some lists of Malware Configs☆170Updated 5 months ago
- Awesome list of keywords and artifacts for Threat Hunting sessions☆583Updated last month
- Gets updates from various clearnet domains and ransomware threat actor domains☆394Updated last year
- Cyber Threat Intelligence Data, Indicators, and Analysis☆88Updated 6 months ago
- Malware repository component for samples & static configuration with REST API interface.☆359Updated this week
- Zeek-Formatted Threat Intelligence Feeds☆370Updated this week
- Purpleteam scripts simulation & Detection - trigger events for SOC detections☆185Updated 6 months ago