malware-ioc
Malware detection toolkit
Provides a set of standardized indicators to help detect and assess malware presence
Indicators of Compromise (IOCs) for malware we have researched
10 stars
11 watching
2 forks
Language: YARA
last commit: over 1 year ago Related projects:
Repository | Description | Stars |
---|---|---|
| A repository of malware indicators and rules for threat hunting and analysis. | 1,698 |
| A collection of threat intelligence data, specifically malware indicators related to compromise events. | 221 |
| Automates malware analysis on Windows VMs for research and testing purposes. | 1,036 |
| A collection of indicators tracking malware activities | 14 |
| A collection of indicators of compromise related to a malware family used for financial crimes and other malicious activities | 56 |
| Extracts indicators of compromise from PDF security reports | 430 |
| A comprehensive Golang library for developing malware and security infrastructure tools. | 937 |
| An environment for building secure and isolated test automation frameworks for analyzing and testing malware | 816 |
| A tool designed to detect and collect sensitive information from malicious users by mimicking popular network services | 377 |
| A collection of threat intelligence indicators for identifying malicious software and activities | 267 |
| Sandbox for analyzing and understanding JavaScript malware | 465 |
| An analysis repository providing scripts, signatures, and IOCs for detecting and analyzing malware. | 110 |
| A modular host-based IOC scanner built around YARA pattern matching engine | 164 |
| A command-line tool for analyzing malware and disassembling binary files | 386 |
| Detects misconfigurations and vulnerabilities in software supply chains during build pipelines. | 239 |