The repository contains IOCs in CSV format for APT, Cyber Crimes, Malware and Trojan and whatever I found as part of hunting and research
☆12Jun 10, 2017Updated 8 years ago
Alternatives and similar repositories for IOCs-in-CSV-format
Users that are interested in IOCs-in-CSV-format are comparing it to the libraries listed below
Sorting:
- Multiple rules for yara-project for detect compiler/packer/protector☆33Dec 24, 2019Updated 6 years ago
- Security R package with a set of utils to analyse the different industry standards (MITRE and NIST).☆12May 27, 2019Updated 6 years ago
- Ponmocup Indicators of Compromise☆11Feb 4, 2016Updated 10 years ago
- ☆15Oct 11, 2023Updated 2 years ago
- An informational repo about hunting for adversaries in your IT environment.☆14Apr 10, 2017Updated 8 years ago
- A custom script I created because I got tired of installing my tools manually!☆15May 16, 2023Updated 2 years ago
- SecTalks socially authored website☆20Jul 23, 2025Updated 7 months ago
- The Repository contains various payloads, tools, tips and tricks from various hackers around the world. Please take a quick look down her…☆15May 15, 2025Updated 9 months ago
- My personal experience in Threat Hunting and knowledge gained so far.☆19May 27, 2017Updated 8 years ago
- ☆23Apr 21, 2017Updated 8 years ago
- ☆25Jun 2, 2023Updated 2 years ago
- Python IOC Editor☆65Mar 10, 2015Updated 10 years ago
- My Yara Rules Collection☆52Feb 7, 2016Updated 10 years ago
- mindmap created for tools can be used during analysis/investigation☆28Jan 4, 2017Updated 9 years ago
- A Python library to interface with a cuckoo-modified instance☆23Oct 31, 2016Updated 9 years ago
- ☆32Oct 15, 2020Updated 5 years ago
- This script scrapes the list of open Bug Bounty Programs from openbugbounty.org☆28Mar 22, 2022Updated 3 years ago
- Simple Windows Event Log Forwarder (SWELF). Its easy to use/simply works Log Forwarder and EVTX Parser. Almost in full release here at ht…☆24Jun 20, 2023Updated 2 years ago
- Collection of IOCs related to targeting of civil society☆189Nov 11, 2021Updated 4 years ago
- Analyze Emails☆11Dec 8, 2022Updated 3 years ago
- Participate in the 4th U.S. National Action Plan for Open Government☆13Jun 8, 2018Updated 7 years ago
- Informações extras referentes ao Treinamento Novo Pentest Profissional - https://desecsecurity.com/novo-pentest-profissional☆15May 13, 2023Updated 2 years ago
- scripts☆10Aug 25, 2023Updated 2 years ago
- Windows GUI/Execution Engine for Atomic Red Team Atomics☆36May 20, 2020Updated 5 years ago
- c4mund0n60 is a tool that use output of known tools for generate smart information about a domain☆11Sep 20, 2023Updated 2 years ago
- Hardware specifications and schematics for the Worldcoin Orb.☆10Jul 18, 2023Updated 2 years ago
- Splunk App to assist Sysmon Threat Hunting☆38Mar 7, 2017Updated 8 years ago
- USENIX 2023 Artifacts☆11Nov 25, 2022Updated 3 years ago
- Repository for the Oulu University Security Engineering course.☆14Sep 12, 2025Updated 5 months ago
- black Ip lists, dorks-collection☆16Feb 1, 2026Updated last month
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- OWASP Coimbatore's Web & Project Repository☆13Jan 23, 2026Updated last month
- Recon_profile☆38May 18, 2020Updated 5 years ago
- Cipher Suite Checker☆12Mar 22, 2023Updated 2 years ago
- A lightweight packet-level OMNeT++ simulator designed to simulate large FatTree data center networks.☆11Nov 19, 2013Updated 12 years ago
- Nano Pi A64 firmware ( u-boot, kernel 3.10.104 / kernel 3.10.105 )☆10Jun 13, 2019Updated 6 years ago
- Predicting breast cancer at 97.51% accuracy with Naive Bayes Classifier for learning purposes.☆13May 1, 2010Updated 15 years ago
- Do It Yourself! (DIY) Web Penetration Testing is a guideline in performing security test cases against web applications☆39Aug 9, 2023Updated 2 years ago
- Some notes written during my OSCP Journey (KeepNote project)☆10Mar 2, 2020Updated 5 years ago