Further investigation in to APT campaigns disclosed by private security firms and security agencies
☆86Jun 4, 2022Updated 3 years ago
Alternatives and similar repositories for Exploring-APT-campaigns
Users that are interested in Exploring-APT-campaigns are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆24Sep 28, 2022Updated 3 years ago
- Hashes of infamous malware☆26Jul 10, 2023Updated 2 years ago
- ☆161Apr 6, 2026Updated 3 weeks ago
- Public Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchers☆794Feb 8, 2026Updated 2 months ago
- Practice CTI Quiz☆13Mar 20, 2024Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Converting data from services like Censys and Shodan to a common data model☆52Apr 14, 2026Updated 3 weeks ago
- Repository of open source malware here on Github!☆44Jan 11, 2022Updated 4 years ago
- An experimental script to perform bulk parsing of arbitrary file features with YARA and console logging.☆21Nov 13, 2022Updated 3 years ago
- A list of JARM hashes for different ssl implementations used by some C2/red team tools.☆143Apr 20, 2023Updated 3 years ago
- An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.☆205Jul 3, 2024Updated last year
- Personal compilation of APT malware from whitepaper releases, documents and own research☆266Feb 7, 2019Updated 7 years ago
- Learn how to get more out of publicly available threat reports to help improve the security posture of your organization! TLP: White Thre…☆15Jun 5, 2023Updated 2 years ago
- Code for Benchmarking two ML Approaches performing Authorship Attribution☆42Apr 5, 2022Updated 4 years ago
- The Threat Actor Profile Guide for CTI Analysts☆120Jul 15, 2023Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Collection of awesome resources on intelligence writing, including manuals/guides, standards, books, tranings, articles, videos, etc☆611Dec 4, 2025Updated 5 months ago
- ☆12Jun 29, 2021Updated 4 years ago
- Offensive V Programming☆18Nov 3, 2021Updated 4 years ago
- ☆12Nov 21, 2023Updated 2 years ago
- pyJARM is a library for doing JARM fingerprinting using python☆50Mar 23, 2025Updated last year
- Threat Mapping Catalogue☆18Aug 10, 2021Updated 4 years ago
- Repository of YARA rules made by Trellix ATR Team☆627Mar 18, 2025Updated last year
- Hacked up scripts to perform google searches☆16Apr 26, 2024Updated 2 years ago
- Ladon POC Moudle CVE-2019-11043 (PHP-FPM + Ngnix)☆16Nov 11, 2019Updated 6 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- ☆93Jul 30, 2025Updated 9 months ago
- Full of public notes and Utilities☆133Jan 6, 2026Updated 3 months ago
- Recreating and reviewing the Windows persistence methods☆39Nov 18, 2021Updated 4 years ago
- Collection of Malware Lures☆23Oct 8, 2021Updated 4 years ago
- Take a list of URIs and print all the of the paths☆10Aug 16, 2020Updated 5 years ago
- macOS Artifact Intelligence Tool☆13Apr 30, 2019Updated 7 years ago
- Automatically identify and highlight targets (Russian soldiers, right-wing extremists etc) in visualized social networks☆23Sep 4, 2022Updated 3 years ago
- My musings with C#☆28Dec 23, 2022Updated 3 years ago
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆122Mar 4, 2026Updated 2 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Automatic YARA rule generation for Malpedia☆168Sep 8, 2022Updated 3 years ago
- Data visualization for blue teams☆127Jan 20, 2023Updated 3 years ago
- information about ransomware groups (Ransomware Analysis Notes)☆41Dec 26, 2023Updated 2 years ago
- Interesting APT Report Collection And Some Special IOCs☆2,974Apr 23, 2026Updated last week
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Sep 17, 2019Updated 6 years ago
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆209Jul 21, 2022Updated 3 years ago
- A query aggregator for OSINT based threat hunting☆938Mar 7, 2026Updated last month