Pull some Malware samples here for other security researchers/malware analyst's to analyze and play with.
☆173May 29, 2024Updated last year
Alternatives and similar repositories for APT-Sample
Users that are interested in APT-Sample are comparing it to the libraries listed below
Sorting:
- APT Malware Dataset Containing over 3,500 State-Sponsored Malware Samples☆370Nov 10, 2022Updated 3 years ago
- ☆14May 23, 2023Updated 2 years ago
- Indicators of compromise (IOCs) collected from public resources and categorized by Qi-AnXin.☆964Feb 28, 2026Updated 3 weeks ago
- Sound Research SECOMN service Privilege Escalation (windows 10)☆39Mar 17, 2020Updated 6 years ago
- 蚁剑其他脚本AES编/解码器☆36Aug 28, 2019Updated 6 years ago
- Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups☆723Dec 26, 2022Updated 3 years ago
- Code for Benchmarking two ML Approaches performing Authorship Attribution☆43Apr 5, 2022Updated 3 years ago
- Telsy CTI Research Team☆57Dec 15, 2020Updated 5 years ago
- Aggressor Script to launch IE driveby for CVE-2018-15982.☆29Dec 7, 2019Updated 6 years ago
- APT & CyberCriminal Campaign Collection☆4,043Jul 25, 2024Updated last year
- BCS(北京网络安全大会)2019 红队行动会议重点内容☆819Sep 4, 2019Updated 6 years ago
- CVE-2019-12949☆26Jun 28, 2019Updated 6 years ago
- Interesting APT Report Collection And Some Special IOCs☆2,955Updated this week
- Dynamic PowerShell Analysis Framework Based Upon PowerShell Debugging Functionality☆83Feb 18, 2023Updated 3 years ago
- A VBA implementation of the RunPE technique or how to bypass application whitelisting.☆14Dec 30, 2018Updated 7 years ago
- Personal compilation of APT malware from whitepaper releases, documents and own research☆266Feb 7, 2019Updated 7 years ago
- Alternative C# Implementation tool to retrieve Active Directory Integrated DNS records with IP addresses☆50Aug 8, 2020Updated 5 years ago
- A collection of C# tools for various purposes (kerberoasting, tickets, mimikatz, privesc, domain enumeration and more)☆80Aug 12, 2019Updated 6 years ago
- Explore Indicators of Compromise Automatically☆97Feb 27, 2020Updated 6 years ago
- 恶意软件分析套件☆18Jun 27, 2017Updated 8 years ago
- Use to perform Microsoft exchange account brute-force.☆73Apr 17, 2021Updated 4 years ago
- ASUS SmartHome Exploit for CVE-2019-11061 and CVE-2019-11063☆23Aug 27, 2019Updated 6 years ago
- 非法域名挖掘与画像系统。☆36Jul 22, 2017Updated 8 years ago
- ☆16Mar 4, 2019Updated 7 years ago
- Pull some collected APT group related samples, ransomware, remote control and other malicious programs for security researchers to use.☆44Dec 10, 2019Updated 6 years ago
- Attack Detection☆1,360Aug 31, 2022Updated 3 years ago
- Web ExternalC2 Demo☆52Aug 18, 2020Updated 5 years ago
- 获取系统KB补丁对于的MS号☆24Aug 18, 2019Updated 6 years ago
- ☆715Oct 28, 2022Updated 3 years ago
- ATT&CK 框架图中文翻译版 原为安恒奖品,自我二次翻译,修改了一些小的翻译错误问题,自我保存即可☆262Jan 15, 2020Updated 6 years ago
- This repository contains the website and the tools which are part of the joint research between Check Point Research and Intezer to map t…☆109Oct 30, 2019Updated 6 years ago
- 恶意代码家族聚类。DataCon☆11Jun 4, 2019Updated 6 years ago
- Various public documents, whitepapers and articles about APT campaigns☆3,643Jan 1, 2024Updated 2 years ago
- Phantom eye——A passive business logic vulnerability auditing tool☆52Mar 25, 2019Updated 6 years ago
- An easy ATT&CK-based Sysmon hunting tool, showing in Blackhat USA 2019 Arsenal☆205Apr 18, 2022Updated 3 years ago
- Windows 10 LPE (UAC Bypass) in Windows Store (WSReset.exe)☆267Dec 19, 2019Updated 6 years ago
- 一个Burp插件,实现用AES算法透明加密原版菜刀Caidao.exe与服务器端交互的http数据流☆79Jan 19, 2019Updated 7 years ago
- exp of CVE-2018-15982☆181Jan 4, 2019Updated 7 years ago
- Vulnerability Verification Environment based on Docker☆111Jun 17, 2019Updated 6 years ago