APT & CyberCriminal Campaign Collection
☆4,082Jul 25, 2024Updated last year
Alternatives and similar repositories for APT_CyberCriminal_Campagin_Collections
Users that are interested in APT_CyberCriminal_Campagin_Collections are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Interesting APT Report Collection And Some Special IOCs☆2,986May 9, 2026Updated last week
- Various public documents, whitepapers and articles about APT campaigns☆3,654Jan 1, 2024Updated 2 years ago
- APTnotes data☆1,786Dec 16, 2024Updated last year
- Indicators of compromise (IOCs) collected from public resources and categorized by Qi-AnXin.☆968Feb 28, 2026Updated 2 months ago
- A toolset to make a system look as if it was the victim of an APT attack☆2,739Sep 23, 2025Updated 7 months ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups☆726Dec 26, 2022Updated 3 years ago
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,559Jan 12, 2026Updated 4 months ago
- A curated list of Awesome Threat Intelligence resources☆10,195Jan 19, 2026Updated 4 months ago
- YARA signature and IOC database for my scanners and tools☆2,955May 8, 2026Updated last week
- Small and highly portable detection tests based on MITRE's ATT&CK.☆11,959May 12, 2026Updated last week
- Windows Events Attack Samples☆2,560Jan 24, 2023Updated 3 years ago
- Wiki to collect Red Team infrastructure hardening resources☆4,480Oct 1, 2025Updated 7 months ago
- Indicators of Compromises (IOC) of our various investigations☆1,952May 14, 2026Updated last week
- Defund the Police.☆13,769Jun 7, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Automated Adversary Emulation Platform☆6,965Updated this week
- Repository of yara rules☆4,788Apr 17, 2024Updated 2 years ago
- Main Sigma Rule Repository☆10,451Updated this week
- Malwoverview is a first response tool for threat hunting across VirusTotal, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, M…☆3,822Apr 16, 2026Updated last month
- Attack and defend active directory using modern post exploitation adversary tradecraft activity☆4,823Jul 29, 2025Updated 9 months ago
- Detect Tactics, Techniques & Combat Threats☆2,290Apr 29, 2026Updated 3 weeks ago
- Cyber Threat Intelligence Repository expressed in STIX 2.0☆2,055May 12, 2026Updated last week
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)☆8,553May 9, 2026Updated last week
- Automate the creation of a lab environment complete with security tooling and logging best practices☆4,962Jul 6, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Investigate malicious Windows logon by visualizing and analyzing Windows event log☆3,176Apr 22, 2026Updated 3 weeks ago
- List of Awesome CobaltStrike Resources☆4,416Sep 20, 2023Updated 2 years ago
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆10,322May 7, 2026Updated last week
- Your Everyday Threat Intelligence☆1,982Updated this week
- Covenant is a collaborative .NET C2 framework for red teamers.☆4,687Jul 18, 2024Updated last year
- Red Teaming Tactics and Techniques☆4,589Aug 22, 2024Updated last year
- Loki - Simple IOC and YARA Scanner☆3,756Jan 12, 2026Updated 4 months ago
- ☆1,136Dec 19, 2023Updated 2 years ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆1,759Jan 16, 2026Updated 4 months ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the …☆1,408Nov 7, 2024Updated last year
- Windows Event Log Killer☆1,810Sep 21, 2023Updated 2 years ago
- MISP (core software) - Open Source Threat Intelligence and Sharing Platform☆6,290May 13, 2026Updated last week
- Utilities for Sysmon☆1,644Apr 4, 2026Updated last month
- Utilities for MITRE™ ATT&CK☆1,049Jan 3, 2026Updated 4 months ago
- Extract and aggregate threat intelligence.☆910Jan 31, 2024Updated 2 years ago
- Open Source Security Events Metadata (OSSEM)☆1,294Feb 27, 2023Updated 3 years ago