malware-ioc
Malware detection toolkit
Provides a set of standardized indicators to help detect and assess malware presence
Indicators of Compromise (IOCs) for malware we have researched
10 stars
11 watching
2 forks
Language: YARA
last commit: over 2 years ago Related projects:
| Repository | Description | Stars |
|---|---|---|
| | A repository of malware indicators and rules for threat hunting and analysis. | 1,698 |
| | A collection of threat intelligence data, specifically malware indicators related to compromise events. | 221 |
| | Automates malware analysis on Windows VMs for research and testing purposes. | 1,036 |
| | A collection of indicators tracking malware activities | 14 |
| | A collection of indicators of compromise related to a malware family used for financial crimes and other malicious activities | 56 |
| | Extracts indicators of compromise from PDF security reports | 430 |
| | A comprehensive Golang library for developing malware and security infrastructure tools. | 937 |
| | An environment for building secure and isolated test automation frameworks for analyzing and testing malware | 816 |
| | A tool designed to detect and collect sensitive information from malicious users by mimicking popular network services | 377 |
| | A collection of threat intelligence indicators for identifying malicious software and activities | 267 |
| | Sandbox for analyzing and understanding JavaScript malware | 465 |
| | An analysis repository providing scripts, signatures, and IOCs for detecting and analyzing malware. | 110 |
| | A modular host-based IOC scanner built around YARA pattern matching engine | 164 |
| | A command-line tool for analyzing malware and disassembling binary files | 386 |
| | Detects misconfigurations and vulnerabilities in software supply chains during build pipelines. | 239 |