A map displaying threat actors from the misp-galaxy
☆33Jan 16, 2023Updated 3 years ago
Alternatives and similar repositories for aptmap
Users that are interested in aptmap are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Qakbot Registry Key Configuration Decryptor☆14Dec 20, 2021Updated 4 years ago
- Infecting PE☆25Mar 10, 2014Updated 12 years ago
- ☆24Sep 28, 2022Updated 3 years ago
- Napkin is a simple tool to produce statistical analysis of a text☆12Feb 25, 2024Updated 2 years ago
- A Maltego transform for VirusTotal Submitter Information☆36May 15, 2019Updated 6 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Automatically exported from code.google.com/p/verify-sigs☆18Sep 2, 2016Updated 9 years ago
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆43Sep 18, 2018Updated 7 years ago
- Easy way to create a MISP event related to a Phishing page☆17May 31, 2023Updated 2 years ago
- ActiveMime File Format Documentation☆19Jun 28, 2021Updated 4 years ago
- macos-collector - Automated Collection of macOS Forensic Artifacts for DFIR☆42Apr 13, 2026Updated 2 weeks ago
- A heuristic, python-based detector for fast-flux botnets.☆13Feb 24, 2012Updated 14 years ago
- Website crawler with YARA detection☆90Aug 20, 2023Updated 2 years ago
- a open source rat from china☆27Oct 28, 2016Updated 9 years ago
- Shared yara rules☆30Mar 17, 2014Updated 12 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Scripts and Modules for forensical analyses of mysql database systems☆22Sep 19, 2014Updated 11 years ago
- Advanced Persistent Threat Detection Using Network Analysis☆23Feb 28, 2019Updated 7 years ago
- Structure aware fuzzing for network traffic packet captures☆13Nov 18, 2025Updated 5 months ago
- Dalvik Header Plugin for IDA Pro☆23Jan 22, 2013Updated 13 years ago
- Install, uninstall and control remote and local windows services☆13Feb 4, 2013Updated 13 years ago
- Reverse engineered APT38 DYEPACK samples used to empty SWIFT banking servers. Use caution when handling live binaries.☆23Mar 20, 2019Updated 7 years ago
- A Yara rule generator for finding related samples and hunting☆165Sep 11, 2022Updated 3 years ago
- Traceroute improved wrapper for CSIRT and CERT operators☆40Oct 9, 2024Updated last year
- Scripts to detect Fast-Flux and DGA using DNS query responses☆44Jun 7, 2017Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A library for managing global application state (similar to redux).☆15May 19, 2021Updated 4 years ago
- Joystick is a tool that gives you the ability to transform the ATT&CK Evaluations data into concise views that brings forward the nuances…☆64Sep 13, 2023Updated 2 years ago
- Know Your IP: Get location, blacklist status, shodan and censys results, and more.☆21Dec 15, 2025Updated 4 months ago
- Endpoint monitoring stack.☆19Nov 5, 2015Updated 10 years ago
- Tracing and parsing an executing binary file☆30Aug 7, 2015Updated 10 years ago
- A script that extracts embedded images from Office Open XML (OOXML) documents and generates image hash similarity graphs that cluster vis…☆23Dec 12, 2021Updated 4 years ago
- Tool to decrypt encrypted strings in AgentTesla☆16Jan 24, 2022Updated 4 years ago
- Universal Malware Sample Encryption☆13Jan 5, 2024Updated 2 years ago
- The Multiplatform Linux Sandbox☆16Dec 19, 2023Updated 2 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A set of host side go libraries used by our utilities, drivers, and provisioners☆13Apr 15, 2026Updated 2 weeks ago
- SAS_Registry_Hack (Super Administrator Suppressor) is a Simple Reg. File which totally disables every user control (UAC) and a little mor…☆18Oct 22, 2020Updated 5 years ago
- A Chinese Chat Robot based on AIML and Web.py.☆13Jun 8, 2017Updated 8 years ago
- Yara rules for quick reverse engineering of malware.☆19Dec 9, 2015Updated 10 years ago
- Monitor Certificate Transparency Logs For Phishing Domains☆23Nov 19, 2018Updated 7 years ago
- A double entry accounting system/library for Rust☆19Jun 27, 2020Updated 5 years ago
- DbgFlashVul☆12Sep 8, 2015Updated 10 years ago