This repository, dedicated to Phishing Kits zip files YARA rules, is based on zip raw format analysis to find directories and files names. It is open to all rules contribution, allowing users to create pull requests with their own set of rules to enhance detection and defense against Phishing threats. The first set of rules was created for the project PhishingKit-Yara-Search.
FEATURES
ALTERNATIVES
A comprehensive list of APT groups and operations for tracking and mapping different names and naming schemes used by cybersecurity companies and antivirus vendors.
A collection of Yara rules licensed under the DRL 1.1 License.
CINSscore.com provides Threat Intelligence database with accurate IP scores and collective defense through community and Sentinel IPS unit sourced data.
Check the reputation of an IP address to identify potential threats.
A threat intelligence domain/IP/hash threat feeds checker that checks IPVoid, URLVoid, Virustotal, and Cymon.
A visualization tool for threat analysis that organizes APT campaign information and visualizes relations of IOC.
YARA signature and IOC database for LOKI and THOR Lite scanners with high quality rules and IOCs.
PINNED
Fabric Platform by BlackStork
Fabric Platform is a cybersecurity reporting solution that automates and standardizes report generation, offering a private-cloud platform, open-source tools, and community-supported templates.
Mandos Brief Newsletter
Stay ahead in cybersecurity. Get the week's top cybersecurity news and insights in 8 minutes or less.
Wiz
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.
Adversa AI
Adversa AI is a cybersecurity company that provides solutions for securing and hardening machine learning, artificial intelligence, and large language models against adversarial attacks, privacy issues, and safety incidents across various industries.