Inside this repository you will find a collection of detection rules, indicators of compromise (IOCs), and other useful pieces of information from our various engagements.
This repository stands to help share actionable threat intelligence on the threat actors and malware we encounter.
This repository is open for anyone to use, but contributions are restricted to DeTraced Security researchers only. Further info can be found here.
Check out our disclaimer.
Unless otherwise noted, all content is © DeTraced Security. Rules and IOCs may be used, but redistribution or modification requires attribution.