SSC-Threat-Intel-IoCs Logo

SSC-Threat-Intel-IoCs

0
Free
Visit Website

Public access for readers of our technical blog posts and reports can access IoCs and other data. If you have any questions related to the data and tools posted here please email us at investigations@securityscorecard.io. This tool provides public access to Indicators of Compromise (IoCs) and other data for readers of Security Scorecard's technical blog posts and reports.

FEATURES

ALTERNATIVES

Lists of sources and utilities to hunt, detect, and prevent evildoers.

Analyze suspicious files, domains, IPs, and URLs to detect malware and other breaches, and share results with the security community.

Deception based detection techniques with MITRE ATT&CK mapping and Honey Resources.

An extendable tool to extract and aggregate IOCs from threat feeds, integrates with ThreatKB and MISP.

C# wrapper around Yara pattern matching library with Loki and Yara signature support.

SeaSponge is an accessible web-based threat modeling tool with a focus on accessibility, aesthetics, and intuitive user experience.

A PowerShell script to interact with the MITRE ATT&CK Framework via its own API using the deprecated MediaWiki API.

Daily feed of bad IPs with blacklist hit scores for cybersecurity professionals to stay informed about malicious IP addresses.