APT hub, It help's research to collect information and data on the latest APT activities. It collects data on APT profiles, IOCs(1 yr), and blogs on searched APT.
☆54Mar 11, 2025Updated 11 months ago
Alternatives and similar repositories for APT-Hub
Users that are interested in APT-Hub are comparing it to the libraries listed below
Sorting:
- A Python tool for exploiting Django RCE via deserialization vulnerabilities in session cookies, allowing remote code execution through fo…☆19Nov 21, 2025Updated 3 months ago
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆36Aug 20, 2023Updated 2 years ago
- TorrentSpyder is a command-line utility designed to retrieve Torrent Download History based on a specified IP address.☆17Oct 19, 2024Updated last year
- Gixposed is a powerful command-line tool designed to search the commit history of Git repositories for sensitive information, such as API…☆37Dec 13, 2024Updated last year
- 🕵️ Email osint tool☆64Aug 23, 2023Updated 2 years ago
- Cuckoo Sandbox is an automated dynamic malware analysis system☆10Sep 11, 2020Updated 5 years ago
- Method of finding interesting domains using keywords + JARMs☆13Jan 30, 2023Updated 3 years ago
- ☆59Oct 24, 2024Updated last year
- Aggressor script to automatically download and load an arsenal of open source and private Cobalt Strike tooling.☆45Aug 16, 2024Updated last year
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆52Jul 15, 2023Updated 2 years ago
- This project aims to bridge the gap between Microsoft Attack Surface Reduction (ASR) rules and MITRE ATT&CK by mapping ASR rules to their…☆29Nov 20, 2024Updated last year
- yara detection rules for hunting with the threathunting-keywords project☆157May 11, 2025Updated 9 months ago
- A Rust PoC implementation of the Early Bird process hollowing technique, inspired by https://github.com/boku7/HOLLOW.☆31Feb 7, 2025Updated last year
- The Shelf is a repository containing various tools, exploits, and scripts that I’ve gathered over the years. These are small but useful u…☆33Feb 16, 2026Updated 2 weeks ago
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆507Aug 14, 2025Updated 6 months ago
- Advanced Hunting Queries☆20Updated this week
- A tool to run and validate telemetry for Atomic Red Team tests☆16Mar 21, 2024Updated last year
- Argus is used to test for Blind XSS and SSRF vulnerbilities or any sort of OOB detection☆13Nov 1, 2024Updated last year
- Aplos an extremely simple fuzzer for Windows binaries.☆68Feb 17, 2025Updated last year
- A series of python scripts to extract information from Dark Web Applications☆14Mar 26, 2025Updated 11 months ago
- OSINT web scraper for SatNow to extract details about satellite components and subsystem specs for in-depth reconnaissance 🛸☆68Nov 23, 2024Updated last year
- Inject shellcode into a valid BMP/GIF image.☆34Sep 7, 2020Updated 5 years ago
- Tools and scripts to deploy and manage OpenRelik instances☆16Updated this week
- Pentest scriptkit for your copypasta☆14Feb 18, 2026Updated last week
- ☆22Jul 19, 2025Updated 7 months ago
- Este proyecto implementa un poderoso túnel SSH totalmente anónimo utilizando la red Tor y múltiples proxies intermedios. Permite enrutar …☆13Aug 17, 2023Updated 2 years ago
- ☆22Feb 19, 2026Updated last week
- rust clr heap encryption (https://github.com/lap1nou/CLR_Heap_encryption), but no heap encryption.☆17Jan 6, 2024Updated 2 years ago
- Slides for COM Hijacking AV/EDR Talk on 38c3☆75Jan 3, 2025Updated last year
- A repository preserving darknet market data, including vendor lists, PGP keys, listings, and more for research & intelligence purposes.☆51Jun 19, 2025Updated 8 months ago
- .NET post-exploitation toolkit for Active Directory reconnaissance and exploitation☆400Jul 23, 2025Updated 7 months ago
- SubCerts is a simple tool that uses certificate transparency logs (via crt.sh) to extract subdomains of a given domain.☆75Jan 6, 2026Updated last month
- Ludus range for the Constructing Defense Lab☆102Feb 23, 2026Updated last week
- lsassdump via RtlCreateProcessReflection and NanoDump☆85Oct 18, 2024Updated last year
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.☆19Jun 22, 2023Updated 2 years ago
- A collection of CVEs weaponized by ransomware operators☆130Oct 13, 2025Updated 4 months ago
- This comprehensive and central repository is designed for cybersecurity enthusiasts, researchers, and professionals seeking to stay ahead…☆138May 22, 2025Updated 9 months ago
- Raw data from Threat Intelligence Reports with automatic reports collection and keyword search across thousands of reports☆153Updated this week
- Zzl is a reconnaissance tool that collects subdomains from SSL certificates in IP ranges☆44Oct 27, 2024Updated last year