malware-ioc
Malware detection toolkit
Provides a set of standardized indicators to help detect and assess malware presence
Indicators of Compromise (IOCs) for malware we have researched
10 stars
11 watching
2 forks
Language: YARA
last commit: over 1 year ago Related projects:
Repository | Description | Stars |
---|---|---|
eset/malware-ioc | A repository of malware indicators and rules for threat hunting and analysis. | 1,647 |
doctorwebltd/malware-iocs | A collection of threat intelligence data, specifically malware indicators related to compromise events. | 220 |
gosecure/malboxes | Automates malware analysis on Windows VMs for research and testing purposes. | 1,030 |
cyberthreatintelligenceentel/malware-ioc | A collection of indicators tracking malware activities | 14 |
pr0xylife/emotet | A collection of indicators of compromise related to a malware family used for financial crimes and other malicious activities | 55 |
armbues/ioc_parser | Extracts indicators of compromise from PDF security reports | 429 |
redcode-labs/coldfire | A comprehensive Golang library for developing malware and security infrastructure tools. | 934 |
withsecureopensource/see | An environment for building secure and isolated test automation frameworks for analyzing and testing malware | 814 |
johnnykv/heralding | A tool designed to detect and collect sensitive information from malicious users by mimicking popular network services | 376 |
citizenlab/malware-indicators | A collection of threat intelligence indicators for identifying malicious software and activities | 266 |
hynekpetrak/malware-jail | Sandbox for analyzing and understanding JavaScript malware | 460 |
telekom-security/malware_analysis | An analysis repository providing scripts, signatures, and IOCs for detecting and analyzing malware. | 110 |
spyre-project/spyre | A modular host-based IOC scanner built around YARA pattern matching engine | 164 |
joxeankoret/pyew | A command-line tool for analyzing malware and disassembling binary files | 383 |
boostsecurityio/poutine | Detects misconfigurations and vulnerabilities in software supply chains during build pipelines. | 229 |