Our objective is to provide the indicators-of-compromise based on published reports for Zero-Day Vulnerability and Ransomware groups. Additionally we have included How to detect different Exploits that Threat Actors commonly used in Post-Exploitation Phase
If We Want To Get Good At Detecting Anything We Need To Know Exactly What We Need To Collect || Detection Knowledge Base ||
S.No | Detection Strategies | Link |
---|---|---|
1 | Zerologon | https://github.com/IRB0T/IOC/tree/main/Detection%20Strategies/Zerologon |
2 | PsExec Execution | https://github.com/IRB0T/IOC/tree/main/Detection%20Strategies/PsExec%20-%20Execution |
3 | WMI | https://github.com/IRB0T/IOC/tree/main/Detection%20Strategies/WMI |
4 | ProxyShell | https://github.com/IRB0T/IOC/tree/main/Detection%20Strategies/ProxyShell |
5 | PowerShell | https://github.com/IRB0T/IOC/tree/main/Detection%20Strategies/PowerShell |
Ransomware-IOCs
S.No | Ransomware (IOCs) | Link |
---|---|---|
1 | 8base | https://github.com/IRB0T/IOC/tree/main/Ransomware/8Base |
2 | BlackCat | https://github.com/IRB0T/IOC/tree/main/Ransomware/BlackCat |
3 | Play | https://github.com/IRB0T/IOC/tree/main/Ransomware/Play |
4 | Royal | https://github.com/IRB0T/IOC/tree/main/Ransomware/Royal |
Vulnerabilities-IOCs