All Projects → volexity → threat-intel

volexity / threat-intel

Licence: other
Signatures and IoCs from public Volexity blog posts.

Programming Languages

python
139335 projects - #7 most used programming language
YARA
70 projects
ruby
36898 projects - #4 most used programming language

Projects that are alternatives of or similar to threat-intel

yara-rules
Yara rules written by me, for free use.
Stars: ✭ 13 (-90%)
Mutual labels:  yara, yara-rules, threat-intelligence
Loki
Loki - Simple IOC and Incident Response Scanner
Stars: ✭ 2,217 (+1605.38%)
Mutual labels:  yara, yara-rules
static file analysis
Analysis of file (doc, pdf, exe, ...) in deep (emmbedded file(s)) with clamscan and yara rules
Stars: ✭ 34 (-73.85%)
Mutual labels:  yara, yara-rules
freki
🐺 Malware analysis platform
Stars: ✭ 327 (+151.54%)
Mutual labels:  yara, threat-intelligence
Hyara
Yara rule making tool (IDA Pro & Binary Ninja & Cutter Plugin)
Stars: ✭ 142 (+9.23%)
Mutual labels:  yara, yara-rules
factual-rules-generator
Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.
Stars: ✭ 62 (-52.31%)
Mutual labels:  yara, yara-rules
yarasploit
YaraSploit is a collection of Yara rules generated from Metasploit framework shellcodes.
Stars: ✭ 31 (-76.15%)
Mutual labels:  yara, yara-rules
Judge-Jury-and-Executable
A file system forensics analysis scanner and threat hunting tool. Scans file systems at the MFT and OS level and stores data in SQL, SQLite or CSV. Threats and data can be probed harnessing the power and syntax of SQL.
Stars: ✭ 66 (-49.23%)
Mutual labels:  yara, yara-rules
Threatingestor
Extract and aggregate threat intelligence.
Stars: ✭ 439 (+237.69%)
Mutual labels:  yara, threat-intelligence
Python Iocextract
Defanged Indicator of Compromise (IOC) Extractor.
Stars: ✭ 300 (+130.77%)
Mutual labels:  yara, threat-intelligence
PhishingKit-Yara-Search
Yara scan Phishing Kit's Zip archive(s)
Stars: ✭ 24 (-81.54%)
Mutual labels:  yara, yara-rules
Analyzer
🔍 Offline Analyzer for extracting features, artifacts and IoCs from Windows, Linux, Android, iPhone, Blackberry, macOS binaries, emails and more
Stars: ✭ 108 (-16.92%)
Mutual labels:  yara, threat-intelligence
yara-validator
Validates yara rules and tries to repair the broken ones.
Stars: ✭ 37 (-71.54%)
Mutual labels:  yara, yara-rules
ThreatKB
Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)
Stars: ✭ 68 (-47.69%)
Mutual labels:  yara, yara-rules
yara-forensics
Set of Yara rules for finding files using magics headers
Stars: ✭ 115 (-11.54%)
Mutual labels:  yara, yara-rules
nsm-attack
Mapping NSM rules to MITRE ATT&CK
Stars: ✭ 53 (-59.23%)
Mutual labels:  threat-intelligence, suricata-rules
Freki
🐺 Malware analysis platform
Stars: ✭ 285 (+119.23%)
Mutual labels:  yara, threat-intelligence
Signature Base
Signature base for my scanner tools
Stars: ✭ 1,212 (+832.31%)
Mutual labels:  yara, threat-intelligence
PEiD
Yet another implementation of PEiD with yara
Stars: ✭ 12 (-90.77%)
Mutual labels:  yara, yara-rules
Malware Indicators
Citizen Lab Malware Reports
Stars: ✭ 196 (+50.77%)
Mutual labels:  yara

threat-intel

This repository contains IoCs related to Volexity public threat intelligence blog posts.

They are organised by year, and within each year, each folder relates to a specific post.

Each post approximately follows the same folder structure - some files or folders may be missing if there is no applicable data for the post.

* YYYY-MM-DD - [Title]
    * indicators
        * indicators.csv
        * snort.rules
        * yara.yar
        * suricata.rules
    * scripts
        * foo.py
    * attachments
        * anything_else.txt

All rules provided are subject to the 2-Clause BSD License found in "LICENSE.txt"

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].