CyberRa1 / APT-HubLinks
APT hub, It help's research to collect information and data on the latest APT activities. It collects data on APT profiles, IOCs(1 yr), and blogs on searched APT.
☆51Updated 2 months ago
Alternatives and similar repositories for APT-Hub
Users that are interested in APT-Hub are comparing it to the libraries listed below
Sorting:
- ☆63Updated this week
- ☆37Updated last year
- Living Off Security Tools☆45Updated 7 months ago
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe☆33Updated 11 months ago
- ☆23Updated 3 months ago
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆30Updated 2 months ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts.☆120Updated last year
- This repository contains a comprehensive testing designed for evaluating the performance and resilience of Endpoint Detection and Respons…☆54Updated 7 months ago
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files☆89Updated 2 months ago
- Repo for all my exploits/PoCs☆50Updated 3 weeks ago
- MSSprinkler is a password spraying utility for organizations to test their Microsoft Online accounts from an external perspective. It emp…☆75Updated 3 months ago
- ☆39Updated 5 months ago
- ☆77Updated last year
- Modular framework for automating triaging, malware analysis, and analyst workflows☆39Updated last month
- ☆32Updated 2 years ago
- ☆21Updated this week
- ☆80Updated 6 months ago
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆39Updated 4 months ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆82Updated last year
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆124Updated last year
- MS Graph Commands and Tools for Blue Teamers☆49Updated last year
- Powershell tools used for Red Team / Pentesting.☆76Updated last year
- Finding Missing People, extract information in Dark Web and Surfaceweb Investigation and Human Trafficking Support☆33Updated last year
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆52Updated 5 months ago
- Weaponized EvilnoVNC: Scalable and semi-automated MFA-Phishing☆48Updated 2 months ago
- This repository is meant to catalog network and host artifacts associated with various EDR products "shell" and response functionalities.☆79Updated 9 months ago
- Top 400 passwords as per HaveIBeenPwned☆22Updated 7 months ago
- Persist like a Dodder☆60Updated 2 weeks ago
- The SAP Threat Modeling Tool is an on-premises open-source web application designed to analyze and visualize connections between SAP syst…☆48Updated 2 months ago
- ☆35Updated last year