Pull some Malware samples here for other security researchers/malware analyst's to analyze and play with.
☆173May 29, 2024Updated last year
Alternatives and similar repositories for APT-Sample
Users that are interested in APT-Sample are comparing it to the libraries listed below
Sorting:
- APT Malware Dataset Containing over 3,500 State-Sponsored Malware Samples☆361Nov 10, 2022Updated 3 years ago
- 蚁剑其他脚本AES编/解码器☆36Aug 28, 2019Updated 6 years ago
- Indicators of compromise (IOCs) collected from public resources and categorized by Qi-AnXin.☆960Aug 28, 2025Updated 6 months ago
- ☆14May 23, 2023Updated 2 years ago
- CVE-2019-12949☆26Jun 28, 2019Updated 6 years ago
- Sound Research SECOMN service Privilege Escalation (windows 10)☆39Mar 17, 2020Updated 5 years ago
- Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups☆723Dec 26, 2022Updated 3 years ago
- Dynamic PowerShell Analysis Framework Based Upon PowerShell Debugging Functionality☆83Feb 18, 2023Updated 3 years ago
- Alternative C# Implementation tool to retrieve Active Directory Integrated DNS records with IP addresses☆50Aug 8, 2020Updated 5 years ago
- Code for Benchmarking two ML Approaches performing Authorship Attribution☆43Apr 5, 2022Updated 3 years ago
- A collection of C# tools for various purposes (kerberoasting, tickets, mimikatz, privesc, domain enumeration and more)☆80Aug 12, 2019Updated 6 years ago
- BCS(北京网络安全大会)2019 红队行动会议重点内容☆819Sep 4, 2019Updated 6 years ago
- ATT&CK 框架图中文翻译版 原为安恒奖品,自我二次翻译,修改了一些小的翻译错误问题,自我保存即可☆262Jan 15, 2020Updated 6 years ago
- A VBA implementation of the RunPE technique or how to bypass application whitelisting.☆14Dec 30, 2018Updated 7 years ago
- Use to perform Microsoft exchange account brute-force.☆73Apr 17, 2021Updated 4 years ago
- Interesting APT Report Collection And Some Special IOCs☆2,915Updated this week
- Phantom eye——A passive business logic vulnerability auditing tool☆52Mar 25, 2019Updated 6 years ago
- APT & CyberCriminal Campaign Collection☆4,043Jul 25, 2024Updated last year
- ASUS SmartHome Exploit for CVE-2019-11061 and CVE-2019-11063☆23Aug 27, 2019Updated 6 years ago
- New Found 0-days!☆36Dec 4, 2019Updated 6 years ago
- Personal compilation of APT malware from whitepaper releases, documents and own research☆265Feb 7, 2019Updated 7 years ago
- Windows 10 LPE (UAC Bypass) in Windows Store (WSReset.exe)☆267Dec 19, 2019Updated 6 years ago
- exp of CVE-2018-15982☆181Jan 4, 2019Updated 7 years ago
- Vulnerability Verification Environment based on Docker☆111Jun 17, 2019Updated 6 years ago
- ☆16Mar 4, 2019Updated 6 years ago
- Aggressor Script to launch IE driveby for CVE-2018-15982.☆29Dec 7, 2019Updated 6 years ago
- 非法域名挖掘与画像系统。☆36Jul 22, 2017Updated 8 years ago
- An easy ATT&CK-based Sysmon hunting tool, showing in Blackhat USA 2019 Arsenal☆205Apr 18, 2022Updated 3 years ago
- CatchMail can be used to find some email addresses!☆73May 22, 2023Updated 2 years ago
- Web ExternalC2 Demo☆52Aug 18, 2020Updated 5 years ago
- 一个对常见的web日志进行解析处理的粗糙DEMO☆21Jun 3, 2018Updated 7 years ago
- Telsy CTI Research Team☆57Dec 15, 2020Updated 5 years ago
- 红队基础设施自动化部署工具☆852Jan 4, 2023Updated 3 years ago
- Various public documents, whitepapers and articles about APT campaigns☆3,647Jan 1, 2024Updated 2 years ago
- Explore Indicators of Compromise Automatically☆97Feb 27, 2020Updated 6 years ago
- ☆21Oct 22, 2019Updated 6 years ago
- 获取系统KB补丁对于的MS号☆24Aug 18, 2019Updated 6 years ago
- Mem2Img: Memory-Resident Malware Detection via Convolution Neural Network☆25May 6, 2021Updated 4 years ago
- Local privilege escalation PoC exploit for CVE-2019-16098☆201Sep 13, 2019Updated 6 years ago