awesome-iocs
awesome-hacking
awesome-iocs | awesome-hacking | |
---|---|---|
3 | 1 | |
733 | 12,146 | |
- | - | |
10.0 | 3.0 | |
about 3 years ago | about 2 months ago | |
Shell | ||
GNU General Public License v3.0 or later | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
awesome-iocs
-
Private Spies Hired by FBI and Corporations Infiltrate Discord, Reddit, WhatsApp
Is your iOS device hardened, e.g. Lockdown Mode, locally supervised by Apple Configurator 2 with restrictive policies? You can also look for forensic artifacts in iOS device backups.
https://docs.mvt.re/en/latest/ios/methodology/
https://www.amnesty.org/en/latest/research/2021/07/forensic-...
https://github.com/sroberts/awesome-iocs
-
IOC hunt ( Indicators of compromise )
Not sure this is an intel question so much as a cybersecurity question. If you're just looking for iocs the best ones are available with a contract from the various cybersecurity firms. If you have a specific worry, it is probably worth a threat hunt with one of them. If not, you can google what public databases are available.
-
Cybersecurity Repositories
IOC
awesome-hacking
-
Cybersecurity Repositories
Hacking
What are some alternatives?
APTnotes - Various public documents, whitepapers and articles about APT campaigns
API-Security-Checklist - Checklist of the most important security countermeasures when designing, testing, and releasing your API
awesome-ml-for-cybersecurity - :octocat: Machine Learning for Cyber Security
Probable-Wordlists - Version 2 is live! Wordlists sorted by probability originally created for password generation and testing - make sure your passwords aren't popular!
android-security-awesome - A collection of android security related resources
Awesome Cryptography - A curated list of cryptography resources and links.
awesome-malware-analysis - Defund the Police.
awesome-honeypots - an awesome list of honeypot resources
SecLists - SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
awesome-incident-response - A curated list of tools for incident response
vulhub - Pre-Built Vulnerable Environments Based on Docker-Compose