BushidoUK / Exploring-APT-campaignsView external linksLinks
Further investigation in to APT campaigns disclosed by private security firms and security agencies
☆87Jun 4, 2022Updated 3 years ago
Alternatives and similar repositories for Exploring-APT-campaigns
Users that are interested in Exploring-APT-campaigns are comparing it to the libraries listed below
Sorting:
- Hashes of infamous malware☆26Jul 10, 2023Updated 2 years ago
- ☆24Sep 28, 2022Updated 3 years ago
- ☆150Jun 14, 2023Updated 2 years ago
- Public Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchers☆768Updated this week
- Converting data from services like Censys and Shodan to a common data model☆51Updated this week
- Ladon POC Moudle CVE-2019-11043 (PHP-FPM + Ngnix)☆16Nov 11, 2019Updated 6 years ago
- Repository of open source malware here on Github!☆44Jan 11, 2022Updated 4 years ago
- Take a list of URIs and print all the of the paths☆10Aug 16, 2020Updated 5 years ago
- Practice CTI Quiz☆13Mar 20, 2024Updated last year
- ☆12Jun 29, 2021Updated 4 years ago
- The Threat Actor Profile Guide for CTI Analysts☆116Jul 15, 2023Updated 2 years ago
- A list of JARM hashes for different ssl implementations used by some C2/red team tools.☆145Apr 20, 2023Updated 2 years ago
- Plugins for the Viper Framework☆14Sep 21, 2019Updated 6 years ago
- Personal compilation of APT malware from whitepaper releases, documents and own research☆266Feb 7, 2019Updated 7 years ago
- Data visualization for blue teams☆126Jan 20, 2023Updated 3 years ago
- macOS Artifact Intelligence Tool☆13Apr 30, 2019Updated 6 years ago
- Resources About Shellcode☆217Mar 17, 2020Updated 5 years ago
- ☆92Jul 30, 2025Updated 6 months ago
- ☆12Nov 21, 2023Updated 2 years ago
- Conceptual Methods for Finding Commonalities in Macho Files☆12Mar 21, 2024Updated last year
- Offensive V Programming☆18Nov 3, 2021Updated 4 years ago
- A variation CredBandit that uses compression to reduce the size of the data that must be trasnmitted.☆19Jun 24, 2021Updated 4 years ago
- Collection of awesome resources on intelligence writing, including manuals/guides, standards, books, tranings, articles, videos, etc☆591Dec 4, 2025Updated 2 months ago
- An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.☆202Jul 3, 2024Updated last year
- pyJARM is a library for doing JARM fingerprinting using python☆50Mar 23, 2025Updated 10 months ago
- Simple yara rule manager☆66Dec 27, 2022Updated 3 years ago
- Python wrappers for mal_unpack☆37Sep 19, 2023Updated 2 years ago
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆207Jul 21, 2022Updated 3 years ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆150Sep 22, 2023Updated 2 years ago
- A query aggregator for OSINT based threat hunting☆930Jan 23, 2026Updated 3 weeks ago
- Threat Mapping Catalogue☆18Aug 10, 2021Updated 4 years ago
- An experimental script to perform bulk parsing of arbitrary file features with YARA and console logging.☆21Nov 13, 2022Updated 3 years ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆60Oct 28, 2022Updated 3 years ago
- Interesting APT Report Collection And Some Special IOCs☆2,889Updated this week
- A collection of Covid-19 related threat intelligence and resources.☆19Jul 17, 2020Updated 5 years ago
- Threat Box Assessment Tool☆19Aug 15, 2021Updated 4 years ago
- Indicators of compromise (IOCs) collected from public resources and categorized by Qi-AnXin.☆959Aug 28, 2025Updated 5 months ago
- A library for fast parse & import of Windows Eventlogs into Elasticsearch.☆86Jun 23, 2025Updated 7 months ago
- Use to copy a file from an NTFS partitioned volume by reading the raw volume and parsing the NTFS structures.☆119Apr 22, 2021Updated 4 years ago