Malware Indicators of Compromise (IOCs) provided by ESET Research to help the security community fight malware, including Yara rules, Snort rules, and lists of malware sample digests in various formats. Contributions and issue reports are welcome under the BSD two-clause license.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
YARA signature and IOC database for LOKI and THOR Lite scanners with high quality rules and IOCs.
A reference implementation for collecting events and performing CAR analytics to detect potential adversary activity.
Packet Storm is a global security resource providing around-the-clock information and tools to mitigate personal data and fiscal loss on a global scale.
AbuseHelper is an open-source framework for receiving and redistributing abuse feeds and threat intel.
Zero Day Live is a threat intelligence platform that provides early detection of malware and zero-day vulnerabilities through a proprietary sensor network processing over 1 billion data points.
FraudGuard is a service that provides real-time internet traffic analysis and IP tracking to help validate usage and prevent fraud.
Real-time, container-based file scanning system for threat hunting and incident response.
TIH is an intelligence tool that helps you search for IOCs across multiple security feeds and APIs.
Knowledge base workflow management dashboard for YARA rules and C2 artifacts.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.