Here are
22 public repositories
matching this topic...
TheHive: a Scalable, Open Source and Free Security Incident Response Platform
-
Updated
Sep 30, 2020
-
JavaScript
🏴☠️ Tools for pentesting, CTFs & wargames. 🏴☠️
Cortex: a Powerful Observable Analysis and Active Response Engine
-
Updated
Sep 30, 2020
-
Scala
-
Updated
Oct 1, 2020
-
Python
The OSINT Omnibus (beta release)
-
Updated
Aug 18, 2020
-
Python
本项目致力于收集网上公开来源的威胁情报,主要关注信誉类威胁情报(如IP/域名等),以及事件类威胁情报。
-
Updated
Oct 28, 2017
-
Python
Repository of YARA rules made by McAfee ATR Team
-
Updated
Sep 25, 2020
-
YARA
Extract indicators of compromise from text, including "escaped" ones.
Historical list of {Cobalt Strike,NanoHTTPD} servers
Explore Indicators of Compromise Automatically
-
Updated
Feb 27, 2020
-
Python
Operation Wocao - Indicators of Compromise
-
Updated
Dec 19, 2019
-
YARA
-
Updated
Sep 29, 2020
-
Python
A collection of Python utilities for use in scripts related to working with "indicators of compromise" (IOCs).
-
Updated
Dec 19, 2018
-
Python
DigitalShadows Alert Feeder for TheHive, an Open Source and Free Security Incident Response Platform
-
Updated
Jul 8, 2019
-
Python
Quickly generate suricata rules for IOCs
PsiXBot Indicators of Compromise
Cortex jobs automation for TheHive
-
Updated
May 28, 2018
-
Python
-
Updated
Feb 22, 2018
-
Python
Quick method to extract Indicators of Compromise (IOCs) from a Threat Intel Report in PDF format.
-
Updated
Sep 15, 2020
-
Python
Cuckoo Sandbox Dockerfile
-
Updated
Feb 28, 2018
-
Shell
Threat Intelligence & Indicators of Compromise repository.
Improve this page
Add a description, image, and links to the
iocs
topic page so that developers can more easily learn about it.
Curate this topic
Add this topic to your repo
To associate your repository with the
iocs
topic, visit your repo's landing page and select "manage topics."
Learn more
You can’t perform that action at this time.
You signed in with another tab or window. Reload to refresh your session.
You signed out in another tab or window. Reload to refresh your session.