t4d / PhishingKit-Yara-RulesLinks
Repository of Yara rules dedicated to Phishing Kits Zip files
☆234Updated last month
Alternatives and similar repositories for PhishingKit-Yara-Rules
Users that are interested in PhishingKit-Yara-Rules are comparing it to the libraries listed below
Sorting:
- IOK (Indicator Of Kit) is an open source language and ruleset for detecting phishing threat actor tools and tactics☆190Updated 7 months ago
- Welcome to the SEKOIA.IO Community repository!☆169Updated this week
- Open Source Platform for storing, organizing, and searching documents related to cyber threats☆168Updated 2 years ago
- ☆148Updated last month
- Exposing phishing kits seen from phishunt.io☆261Updated 5 months ago
- A phishing kit collector for scavengers☆220Updated 2 weeks ago
- Ransomware leak site monitoring☆315Updated 3 years ago
- A tool designed to hunt for Phishing Kit source code☆229Updated 2 years ago
- ☆212Updated 6 months ago
- The Threat Actor Profile Guide for CTI Analysts☆115Updated 2 years ago
- Cyber Threat Intelligence Data, Indicators, and Analysis☆103Updated 2 weeks ago
- Threat Hunting queries for various attacks☆244Updated this week
- This repository is for Indicators of Compromise (IOCs) from Zscaler ThreatLabz public reports☆75Updated 4 months ago
- Yara scan Phishing Kit's Zip archive(s)☆62Updated 5 months ago
- Automated YARA Rule Standardization and Quality Assurance Tool☆259Updated this week
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆119Updated last year
- 🏴☠️💰 Another Ransomware gang tracker☆269Updated 2 months ago
- ☆195Updated last year
- Zeek-Formatted Threat Intelligence Feeds☆381Updated this week
- TweetFeed collects Indicators of Compromise (IOCs) shared by the infosec community at Twitter. Here you will find malicious URLs, domains…☆607Updated this week
- Collection of private Yara rules.☆374Updated last week
- Indicators of Compromise☆237Updated 3 weeks ago
- This repository contains Malicious Indicator of Compromise (IOC) blocklist for MISP, firewall which is vital for cybersecurity profession…☆116Updated 2 months ago
- Live forensic artifacts collector☆173Updated last year
- Awesome VirusTotal Intelligence Search Queries☆333Updated 2 years ago
- Signatures and IoCs from public Volexity blog posts.☆360Updated last month
- Sublime rules for email attack detection, prevention, and threat hunting.☆334Updated this week
- acquire is a tool to quickly gather forensic artifacts from disk images or a live system into a lightweight container.☆113Updated last week
- ☆96Updated 7 months ago
- Threat Intel Platform for T-POTs☆157Updated this week