Threat intelligence and threat detection indicators (IOC, IOA)
-
Updated
Nov 27, 2020 - YARA
Threat intelligence and threat detection indicators (IOC, IOA)
A comprehensive repository for malware analysis and threat intelligence, including Cobalt Strike Beacon configurations, YARA rules, IOCs, Suricata rules, and malware samples to support cybersecurity efforts.
VenomStrike: A lightweight, blazing-fast malware scanner that identifies known threats via SHA-256, MD5 hashes and YARA rules. Confirms if a file is a known malware sample. No bloat — just raw speed, simplicity, and full portability.
Yara Rules to detect the ZeroCrumb Chrome "Exploit"/Killchain
Heuristic Yara Rule (DO NOT USE THIS AS A SIGNATURE BASE IT CAN CREATE MANY FP)
Add a description, image, and links to the threat-detection topic page so that developers can more easily learn about it.
To associate your repository with the threat-detection topic, visit your repo's landing page and select "manage topics."