An open API service providing repository metadata for many open source software ecosystems.

GitHub / Compcode1 / ioc4-unsigned-executable

This case study focused on a low-profile intrusion attempt involving a standalone executable (patcher.exe) found in a writable but non-standard directory (C:\ProgramData\WinUpdate).

JSON API: http://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/Compcode1%2Fioc4-unsigned-executable

Stars: 0
Forks: 0
Open issues: 0

License: gpl-3.0
Language: Jupyter Notebook
Size: 0 Bytes
Dependencies parsed at: Pending

Created at: 6 days ago
Updated at: 6 days ago
Pushed at: 6 days ago
Last synced at: 6 days ago

Topics: application-triage-framework, cybersecurity, edr-telemetry, host-log-cross-reference-protocol, unsigned-executable-detection

    Loading...