team-cymru / iocs
We publish indicators of compromise related to our stories here. See https://blog.team-cymru.com/ for more information.
☆9Updated 3 years ago
Alternatives and similar repositories for iocs:
Users that are interested in iocs are comparing it to the libraries listed below
- Automate the regular transfer of AIS data into a MISP Server☆7Updated 8 months ago
- ☆22Updated 4 years ago
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆21Updated 3 years ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆14Updated last year
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated 4 months ago
- The Multiplatform Linux Sandbox☆15Updated last year
- Prototype system to monitor BGP routes and alert when anomalies are identified☆14Updated 6 years ago
- Chrome extension to extract data from websites surfed inside of chrome☆18Updated 10 years ago
- vyos based isolation of networks☆11Updated 4 years ago
- ☆18Updated last year
- Golang based web service to scan files with yara rules☆27Updated 7 years ago
- Generate bulk YARA rules from YAML input☆22Updated 5 years ago
- Network based steganography based control channels and chat.☆8Updated 8 years ago
- A mapping project between tags (annotations, labels) and domain names☆11Updated 9 months ago
- ☆14Updated 6 years ago
- An active domain name query tool to help keep track of domain name movements...☆15Updated 3 years ago
- Docker projects to retain beacon source IPs using C2 relaying infra☆11Updated 5 years ago
- Carving tool based in Radare2 & Yara☆15Updated 6 years ago
- Collection Of Scripts And Utilities For Windows Event Hunting☆18Updated 5 years ago
- List CVEs and details that apply to your infrastructure (pre-inventoried).☆10Updated 4 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Updated 4 years ago
- YAIDS - Yara-Based IDS - Yara as an Intrusion Detection System / Yet Another Intrusion Detection System - An Intrusion Detection System (…☆22Updated 2 years ago
- Manticore's Public Threats Repository☆10Updated 4 years ago
- Analytics for Accounting logs from Network devices☆16Updated 3 years ago
- Exploit for win10 SMB3.1☆17Updated 4 years ago
- ☆9Updated 5 years ago
- Python library for image hashing and deduplication☆11Updated 9 years ago
- Network Finger Printer☆16Updated 7 years ago
- Python framework for manipulating bulk WHOIS data from RIRs☆20Updated 2 years ago
- Do the unexpected with AD GPO processing☆9Updated 5 years ago