All the principles of the AI modular structure that generates malicious code fragments sold on the dark web
☆69Apr 30, 2024Updated 2 years ago
Alternatives and similar repositories for Cyber_Security_Malware_APT_Simulation
Users that are interested in Cyber_Security_Malware_APT_Simulation are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- AI modular structure that provides automation-based attack and penetration☆14May 10, 2024Updated last year
- TTPMapper is an AI-driven threat intelligence parser that converts unstructured reports whether from web URLs or PDF files into structure…☆53Jun 21, 2025Updated 10 months ago
- Threat Hunting Malware Infrastructure☆11Dec 3, 2023Updated 2 years ago
- Scripts for importing threat feeds and CTI articles, blogs, and reports into MISP.☆18Jun 16, 2025Updated 10 months ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆130Apr 6, 2024Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Simple Chatbot for testing AI Red Team tooling☆17Feb 11, 2025Updated last year
- This project aims to bridge the gap between Microsoft Attack Surface Reduction (ASR) rules and MITRE ATT&CK by mapping ASR rules to their…☆29Nov 20, 2024Updated last year
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.☆54Oct 23, 2024Updated last year
- Repository collecting and automagically processing public threat intelligence reports.☆19May 1, 2020Updated 6 years ago
- Detect userland hooks placed by AV/EDR☆28Sep 4, 2023Updated 2 years ago
- Template repo to quickly create new Github repos with Builds, CI/CD, Linting, Security Scanning, Pre-commit, Direnv, and lots of cool Bad…☆26Feb 3, 2026Updated 3 months ago
- Extract C2 Traffic☆254Nov 25, 2024Updated last year
- Troubleshooting MDE Workstations☆42Apr 23, 2026Updated last week
- This tool can gather a lot of info without any defender alerts. It is useful for Penetration testers, SOC Analysts, System administrators…☆29Apr 9, 2025Updated last year
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ☆35Jan 13, 2026Updated 3 months ago
- Command and Control Framework using powershell implants☆36Jun 17, 2025Updated 10 months ago
- Command line interface (CLI) to install Kali Linux Tools in your desired distribution.☆11May 27, 2022Updated 3 years ago
- Automated DLL Hijacking Discovery, Validation, and Confirmation. Turning local misconfigurations into weaponized, confirmed attack paths.☆360Apr 18, 2026Updated 2 weeks ago
- God Mode Detection Rules☆132Aug 8, 2024Updated last year
- ☆23Mar 17, 2024Updated 2 years ago
- ☆29Feb 16, 2022Updated 4 years ago
- Exploits written while preparing for the OSED exam☆25Apr 30, 2024Updated 2 years ago
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆151Sep 21, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Detection Engineering Tools☆26Updated this week
- Threat Hunting queries of multiple platforms☆67Updated this week
- Cyberex Secure is planned to be a security solution with a wide range of features such as phishing detection, advanced AI- face recognit…☆12Apr 5, 2023Updated 3 years ago
- Save toil in security operations with: Detection & Intelligence Analysis for New Alerts (D.I.A.N.A. )☆223Sep 4, 2024Updated last year
- The Infosec Community Definitive Guide to Jupyter Notebooks☆133Oct 17, 2020Updated 5 years ago
- Adversarial Interception Mission Oriented Discovery and Disruption Framework, or AIMOD2, is a structured threat hunting approach to proac…☆90Sep 16, 2023Updated 2 years ago
- Automating EDR Testing with reference to MITRE ATTACK via Cobalt Strike [Purple Team].☆156Mar 27, 2023Updated 3 years ago
- AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE…☆1,218Dec 29, 2025Updated 4 months ago
- ☆70Apr 16, 2026Updated 2 weeks ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆13Feb 25, 2023Updated 3 years ago
- Security Operations Center Multiple Purpose Tool, takes IP address input, conducts OSINT, conducts splunk, bro, fireeye, imperva, and fir…☆23Jun 6, 2017Updated 8 years ago
- Site for IWS book content☆17Oct 28, 2018Updated 7 years ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆81Mar 19, 2026Updated last month
- Collection of Tools & Techniques for analyzing URLs☆33Oct 1, 2023Updated 2 years ago
- Generate a matrix based on an inventory of InfoSec tools☆24Jul 4, 2024Updated last year