LOKI Logo

LOKI

0
Free
Visit Website

LOKI is a simple IOC and YARA Scanner for Indicators of Compromise Detection. It is based on four detection methods: 1. File Name IOC: Regex match on full file path/name. 2. Yara Rule Check: Yara signature match on file data and process memory. 3. Hash Check: Compares known malicious hashes (MD5, SHA1, SHA256) with scanned files. 4. C2 Back Connect Check: Compares process connection endpoints with C2 IOCs.

FEATURES

ALTERNATIVES

A daily collection of IOCs from various sources, including articles and tweets.

Repository for detection content with various types of rules and payloads.

A serverless application for creating and monitoring URL tokens with threat intelligence and customizable alerts.

An open source threat intelligence platform for storing and managing cyber threat intelligence knowledge.

Repository of YARA rules for identifying and classifying malware.

A tool for creating custom detection rules from YAML input

Python APIs for serializing and de-serializing STIX2 JSON content with higher-level APIs for common tasks.

The Trystero Project is a threat intelligence platform that measures email security efficacy and provides various tools and resources, while VMware Carbon Black offers endpoint protection and workload security solutions.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved