Log4Shell-IOCs
malware-ioc
Log4Shell-IOCs | malware-ioc | |
---|---|---|
1 | 8 | |
184 | 197 | |
0.0% | 0.5% | |
3.6 | 5.7 | |
about 2 years ago | 10 days ago | |
Python | Python | |
- | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Log4Shell-IOCs
malware-ioc
- PTI-257 Group Indicators of Compromise (IOCs) - PTI-257 consists of former Wizard Spider actors who are publicly known for the various malware variants they use (Ryuk, Trickbot, and Conti, among others)
- Decryptor for PlutoCrypt Ransomware
- PTI-249 Group Indicators of Compromise (IOC)
- Vice Society Ransomware Indicators of Compromises (IOC)
- Lockbit Green Indicators of Compromises (IOCs)
- UNC1151 Group Indicators of Compromise (IOC) - a state sponsored actor targeting NATO countries
-
New intel (IoCs) on Conti ransomware group | Credits: prodaft
malware-ioc/Conti at master · prodaft/malware-ioc · GitHub
- Analysis of Brunhilda malware, a DAAS (Dropper as a Service) platform
What are some alternatives?
L4sh - Log4Shell RCE Exploit - fully independent exploit does not require any 3rd party binaries.
Malware-Exhibit - 🚀🚀 This is a 🎇🔥 REAL WORLD🔥 🎇 Malware Collection I have Compiled & analysed by researchers🔥 to understand more about Malware threats😈, analysis and mitigation🧐.
Burp2Malleable - Quick python utility I wrote to turn HTTP requests from burp suite into Cobalt Strike Malleable C2 profiles
pandora - Pandora is an analysis framework to discover if a file is suspicious and conveniently show the results
IntelOwl - IntelOwl: manage your Threat Intelligence at scale
Malware-Sample-Sources - Malware Sample Sources
kestrel-lang - Kestrel threat hunting language: building reusable, composable, and shareable huntflows across different data sources and threat intel.