Visit Website

Collection of YARA signatures from recent malware research: - Dacls Trojan Rule: Dacls_Linux.yara - Dacls_Windows.yara - APT32 KerrDown Rule: APT32_KerrDown.yara - ACBackdoor - Linux build Rule: ACBackdoor_Linux.rule - Unnamed Linux Golang Ransomware Rule: Linux_Golang_Ransomware.rule - KPOT v2 Rule: KPOT_v2.yara - WatchBog Linux botnet Rule: WatchBog_Linux.yara - EvilGnome Linux malware Rule: EvilGnome_Linux.yara - APT34 PICKPOCKET Rule: APT34_PICKPOCKET.yara - APT34 LONGWATCH Rule: APT34_LONGWATCH.yara - APT34 VALUEVAULT Rule: APT34_VALUEVAULT.yara

FEATURES

ALTERNATIVES

OpenPhish provides real-time phishing trends, detecting new phishing URLs and targeting various brands.

Facilitates distribution of Threat Intelligence artifacts to defensive systems.

A project that detects malicious SSL connections by identifying and blacklisting SSL certificates used by botnet C&C servers and identifying JA3 fingerprints to detect and block malware botnet C&C communication.

A system for collecting, managing, and distributing security information on a large scale, developed by CERT Polska.

A tool for navigating and annotating ATT&CK matrices with the ability to define custom layers for specific views.

Facilitating exchange of information and knowledge to collectively protect against cyberattacks.

ThreatMiner is a threat intelligence portal that aggregates data from various sources and provides contextual information related to indicators of compromise (IOCs).

Aggregator of FireHOL IP lists with HTTP-based API service and Python client package.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved