APT hub, It help's research to collect information and data on the latest APT activities. It collects data on APT profiles, IOCs(1 yr), and blogs on searched APT.
☆54Mar 11, 2025Updated last year
Alternatives and similar repositories for APT-Hub
Users that are interested in APT-Hub are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Method of finding interesting domains using keywords + JARMs☆13Jan 30, 2023Updated 3 years ago
- This repository contains OpenIOC rules to aid in hunting for indicators of compromise and TTPs focused on Advanced Persistent Threat grou…☆26Oct 3, 2023Updated 2 years ago
- A series of python scripts to extract information from Dark Web Applications☆14Mar 26, 2025Updated last year
- 🕵️ Email osint tool☆65Aug 23, 2023Updated 2 years ago
- Gixposed is a powerful command-line tool designed to search the commit history of Git repositories for sensitive information, such as API…☆37Dec 13, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Creates an ATT&CK Navigator map of an Adversary Emulation Plan☆17Sep 4, 2021Updated 4 years ago
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆36Aug 20, 2023Updated 2 years ago
- Advanced Hunting Queries☆20Mar 18, 2026Updated 3 weeks ago
- Cuckoo Sandbox is an automated dynamic malware analysis system☆10Sep 11, 2020Updated 5 years ago
- This project aims to bridge the gap between Microsoft Attack Surface Reduction (ASR) rules and MITRE ATT&CK by mapping ASR rules to their…☆29Nov 20, 2024Updated last year
- Finding Missing People, extract information in Dark Web and Surfaceweb Investigation and Human Trafficking Support☆36May 29, 2024Updated last year
- ☆60Oct 24, 2024Updated last year
- ☆25Feb 18, 2025Updated last year
- A Python tool for exploiting Django RCE via deserialization vulnerabilities in session cookies, allowing remote code execution through fo…☆20Nov 21, 2025Updated 4 months ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆511Aug 14, 2025Updated 7 months ago
- Repo for experimenting and testing MCP server builds for CTI-related research.☆27May 13, 2025Updated 10 months ago
- TorrentSpyder is a command-line utility designed to retrieve Torrent Download History based on a specified IP address.☆18Oct 19, 2024Updated last year
- Aggressor script to automatically download and load an arsenal of open source and private Cobalt Strike tooling.☆46Aug 16, 2024Updated last year
- OSINT web scraper for SatNow to extract details about satellite components and subsystem specs for in-depth reconnaissance 🛸☆68Nov 23, 2024Updated last year
- ☆27Mar 6, 2025Updated last year
- A tool to run and validate telemetry for Atomic Red Team tests☆16Mar 21, 2024Updated 2 years ago
- This Repository consists all Public Cheatsheets created by BlackPerl DFIR Content Team☆20Oct 9, 2024Updated last year
- Ludus range for the Constructing Defense Lab☆117Apr 5, 2026Updated last week
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆53Jul 15, 2023Updated 2 years ago
- Developing an open source Windows EDR written in C & C++ & C#☆30Mar 20, 2026Updated 3 weeks ago
- A Rust PoC implementation of the Early Bird process hollowing technique, inspired by https://github.com/boku7/HOLLOW.☆31Feb 7, 2025Updated last year
- ThreatTrack | Shodan + ExploitDB + GitHub + NVD☆17Jul 16, 2024Updated last year
- Argus is used to test for Blind XSS and SSRF vulnerbilities or any sort of OOB detection☆14Nov 1, 2024Updated last year
- Red Team Operations Framework☆24Jul 14, 2024Updated last year
- Raw data from Threat Intelligence Reports with automatic reports collection and keyword search across thousands of reports☆162Updated this week
- A collection of CVEs weaponized by ransomware operators☆129Oct 13, 2025Updated 5 months ago
- ☆173Aug 9, 2025Updated 8 months ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Beacon Object Files used for Cobalt Strike☆19Jul 18, 2023Updated 2 years ago
- This comprehensive and central repository is designed for cybersecurity enthusiasts, researchers, and professionals seeking to stay ahead…☆155May 22, 2025Updated 10 months ago
- This repository contains detailed adversary simulation APT campaigns targeting various critical sectors. Each simulation includes custom …☆1,066Mar 10, 2026Updated last month
- Nuke It From Orbit - remove AV/EDR with physical access☆274Dec 8, 2024Updated last year
- A collection of vibe reverse engineered binaries and malware (for educational purposes only)☆41Mar 3, 2026Updated last month
- All in one - Malware + Analysis by Cylance☆11Nov 23, 2018Updated 7 years ago
- SubCerts is a simple tool that uses certificate transparency logs (via crt.sh) to extract subdomains of a given domain.☆75Jan 6, 2026Updated 3 months ago