Our objective is to provide the indicators-of-compromise based on published reports for Zero-Day Vulnerability and Ransomware groups. Additionally we have included How to detect different Exploits that Threat Actors commonly used in Post-Exploitation Phase
If We Want To Get Good At Detecting Anything We Need To Know Exactly What We Need To Collect || Detection Knowledge Base ||
| S.No | Detection Strategies | Link |
|---|---|---|
| 1 | Zerologon | https://github.com/IRB0T/IOC/tree/main/Detection%20Strategies/Zerologon |
| 2 | PsExec Execution | https://github.com/IRB0T/IOC/tree/main/Detection%20Strategies/PsExec%20-%20Execution |
| 3 | WMI | https://github.com/IRB0T/IOC/tree/main/Detection%20Strategies/WMI |
| 4 | ProxyShell | https://github.com/IRB0T/IOC/tree/main/Detection%20Strategies/ProxyShell |
| 5 | PowerShell | https://github.com/IRB0T/IOC/tree/main/Detection%20Strategies/PowerShell |
Ransomware-IOCs
| S.No | Ransomware (IOCs) | Link |
|---|---|---|
| 1 | 8base | https://github.com/IRB0T/IOC/tree/main/Ransomware/8Base |
| 2 | BlackCat | https://github.com/IRB0T/IOC/tree/main/Ransomware/BlackCat |
| 3 | Play | https://github.com/IRB0T/IOC/tree/main/Ransomware/Play |
| 4 | Royal | https://github.com/IRB0T/IOC/tree/main/Ransomware/Royal |
Vulnerabilities-IOCs