GitHub topics: application-triage-framework
Compcode1/ioc-22-web-shell-upload
This case demonstrates a classic but still deeply effective tactic: the use of an improperly validated file upload to implant a web shell. It wasn’t an exploit. It wasn’t a brute force attack. It was a misused feature — a vulnerable application logic path that let an attacker turn a web server into a foothold.
Language: Jupyter Notebook - Size: 24.4 KB - Last synced at: 26 days ago - Pushed at: 26 days ago - Stars: 0 - Forks: 0

Compcode1/ioc4-unsigned-executable
This case study focused on a low-profile intrusion attempt involving a standalone executable (patcher.exe) found in a writable but non-standard directory (C:\ProgramData\WinUpdate).
Language: Jupyter Notebook - Size: 0 Bytes - Last synced at: about 1 month ago - Pushed at: about 1 month ago - Stars: 0 - Forks: 0
