DailyIOC
Threat intel collector
Automated threat intelligence collection from articles and tweets, utilizing YARA patterns
IOC from articles, tweets for archives
310 stars
38 watching
45 forks
Language: YARA
last commit: 11 months ago
Linked from 1 awesome list
Related projects:
Repository | Description | Stars |
---|---|---|
volexity/threat-intel | A repository of threat intelligence data from public Volexity blog posts. | 318 |
inquest/threatkb | Manages YARA rules and C2 artifacts in a knowledge base workflow | 96 |
advanced-threat-research/yara-rules | A collection of rules to detect and prevent malware infections using YARA-based threat intelligence | 570 |
yelp/threat_intel | Provides APIs for threat intelligence data from Umbrella Investigate and other sources | 274 |
supportintelligence/icewater | A project aiming to improve internet security by analyzing malware and malicious files using YARA rules. | 380 |
cyberdefenses/cdi_yara | A collection of YARA rules based on intelligence profiles and file work. | 19 |
microsoft/libyara.net | A .NET wrapper for the yara threat intelligence analysis library, providing a simplified API for integrating yara into .NET projects. | 51 |
f0wl/yara_rules | A collection of YARA rules for malware analysis and threat intelligence | 10 |
kevthehermit/pastehunter | Automates scanning of publicly hosted pasted data against Yara rules to identify potential security or research threats. | 1,065 |
inquest/threatingestor | Extracts and aggregates threat intelligence from various sources | 831 |
fr0gger/yeti | An open-source platform designed to collect, organize, and provide insights on threat intelligence data | 1 |
imp0rtp3/yara-rules | A repository of custom Yara rules for malware analysis and threat intelligence | 18 |
securitymagic/yara | A collection of YARA rules for detecting malware and suspicious activity in various environments. | 11 |
cluster25/detection | A collection of threat detection rules written in YARA | 13 |
aboutsecurity/rastrea2r | A tool for hunting and tracking Internet of Things (IoT) security threats by collecting and analyzing indicators of compromise (IOCs) | 116 |