malware-indicators
Malware patterns
A collection of threat intelligence indicators for identifying malicious software and activities
Citizen Lab Malware Reports
266 stars
55 watching
69 forks
Language: YARA
last commit: about 4 years ago
Linked from 1 awesome list
iocmalware-researchtechnical-indicators
Related projects:
Repository | Description | Stars |
---|---|---|
citizenlab/malware-signatures | Yara rules for identifying malware families in targeted threats | 134 |
cyberthreatintelligenceentel/malware-ioc | A collection of indicators tracking malware activities | 14 |
eset/malware-ioc | A repository of malware indicators and rules for threat hunting and analysis. | 1,647 |
doctorwebltd/malware-iocs | A collection of threat intelligence data, specifically malware indicators related to compromise events. | 220 |
gosecure/malware-ioc | Provides a set of standardized indicators to help detect and assess malware presence | 10 |
telekom-security/malware_analysis | An analysis repository providing scripts, signatures, and IOCs for detecting and analyzing malware. | 110 |
malwarecantfly/vba2graph | Analyzes VBA code to generate visual call graphs and highlights potential malicious keywords | 274 |
misp/misp-warninglists | Provides lists of known indicators to inform users about potential false positives or other information in threat intelligence data | 532 |
justicerage/yara | A tool for identifying and classifying malware samples based on textual or binary patterns | 7 |
virustotal/yara | A tool for creating pattern matching rules to identify and classify malware samples | 8,300 |
spiderlabs/malware-analysis | A collection of tools and scripts for analyzing malware | 244 |
armbues/ioc_parser | Extracts indicators of compromise from PDF security reports | 429 |
chronicle/gcti | This repository contains signature files for detecting malicious software | 526 |
accidentalrebel/mbcscan | Analyzes malware behavior and maps it to a Malware Behavior Catalog for better understanding | 20 |
dragokas/hijackthis | Scans for and identifies malicious system modifications | 699 |