malware-ioc
Malware detection toolkit
Provides a set of standardized indicators to help detect and assess malware presence
Indicators of Compromise (IOCs) for malware we have researched
10 stars
11 watching
2 forks
Language: YARA
last commit: over 1 year ago Related projects:
Repository | Description | Stars |
---|---|---|
eset/malware-ioc | A repository of malware indicators and rules for threat hunting and analysis. | 1,698 |
doctorwebltd/malware-iocs | A collection of threat intelligence data, specifically malware indicators related to compromise events. | 221 |
gosecure/malboxes | Automates malware analysis on Windows VMs for research and testing purposes. | 1,036 |
cyberthreatintelligenceentel/malware-ioc | A collection of indicators tracking malware activities | 14 |
pr0xylife/emotet | A collection of indicators of compromise related to a malware family used for financial crimes and other malicious activities | 56 |
armbues/ioc_parser | Extracts indicators of compromise from PDF security reports | 430 |
redcode-labs/coldfire | A comprehensive Golang library for developing malware and security infrastructure tools. | 937 |
withsecureopensource/see | An environment for building secure and isolated test automation frameworks for analyzing and testing malware | 816 |
johnnykv/heralding | A tool designed to detect and collect sensitive information from malicious users by mimicking popular network services | 377 |
citizenlab/malware-indicators | A collection of threat intelligence indicators for identifying malicious software and activities | 267 |
hynekpetrak/malware-jail | Sandbox for analyzing and understanding JavaScript malware | 465 |
telekom-security/malware_analysis | An analysis repository providing scripts, signatures, and IOCs for detecting and analyzing malware. | 110 |
spyre-project/spyre | A modular host-based IOC scanner built around YARA pattern matching engine | 164 |
joxeankoret/pyew | A command-line tool for analyzing malware and disassembling binary files | 386 |
boostsecurityio/poutine | Detects misconfigurations and vulnerabilities in software supply chains during build pipelines. | 239 |