DailyIOC

Threat intel collector

Automated threat intelligence collection from articles and tweets, utilizing YARA patterns

IOC from articles, tweets for archives

GitHub

310 stars
38 watching
45 forks
Language: YARA
last commit: 11 months ago
Linked from 1 awesome list


Backlinks from these awesome lists:

Related projects:

Repository Description Stars
volexity/threat-intel A repository of threat intelligence data from public Volexity blog posts. 318
inquest/threatkb Manages YARA rules and C2 artifacts in a knowledge base workflow 96
advanced-threat-research/yara-rules A collection of rules to detect and prevent malware infections using YARA-based threat intelligence 570
yelp/threat_intel Provides APIs for threat intelligence data from Umbrella Investigate and other sources 274
supportintelligence/icewater A project aiming to improve internet security by analyzing malware and malicious files using YARA rules. 380
cyberdefenses/cdi_yara A collection of YARA rules based on intelligence profiles and file work. 19
microsoft/libyara.net A .NET wrapper for the yara threat intelligence analysis library, providing a simplified API for integrating yara into .NET projects. 51
f0wl/yara_rules A collection of YARA rules for malware analysis and threat intelligence 10
kevthehermit/pastehunter Automates scanning of publicly hosted pasted data against Yara rules to identify potential security or research threats. 1,065
inquest/threatingestor Extracts and aggregates threat intelligence from various sources 831
fr0gger/yeti An open-source platform designed to collect, organize, and provide insights on threat intelligence data 1
imp0rtp3/yara-rules A repository of custom Yara rules for malware analysis and threat intelligence 18
securitymagic/yara A collection of YARA rules for detecting malware and suspicious activity in various environments. 11
cluster25/detection A collection of threat detection rules written in YARA 13
aboutsecurity/rastrea2r A tool for hunting and tracking Internet of Things (IoT) security threats by collecting and analyzing indicators of compromise (IOCs) 116