ITAYC0HEN / APT-EcosystemLinks
This repository contains the website and the tools which are part of the joint research between Check Point Research and Intezer to map the connections inside the APT Ecosystem of Russia.
☆111Updated 6 years ago
Alternatives and similar repositories for APT-Ecosystem
Users that are interested in APT-Ecosystem are comparing it to the libraries listed below
Sorting:
- Personal compilation of APT malware from whitepaper releases, documents and own research☆267Updated 6 years ago
- Allows you to quickly query a Windows machine for RAM artifacts☆219Updated 5 years ago
- Malware Sinkhole List in various formats☆102Updated 3 years ago
- ☆136Updated 6 years ago
- Repository containing IOCs, CSV and MISP JSON from our blogs☆83Updated 4 years ago
- snake - a malware storage zoo☆217Updated 2 years ago
- Miscellaneous Malware RE☆196Updated 3 years ago
- Proofpoint - Emerging Threats - Threat Research tools + publicly shared intel and documentation☆80Updated 3 months ago
- ☆128Updated 10 months ago
- A Yara rule generator for finding related samples and hunting☆161Updated 3 years ago
- ☆97Updated 5 years ago
- Yara Ruleset for scanning Linux servers for shells, spamming, phishing and other webserver baddies☆105Updated 4 years ago
- Various config files obtained during malware analysis☆67Updated 7 years ago
- Django web interface for managing Yara rules☆197Updated 7 years ago
- Cuckoo Sandbox plugin for extracts configuration data of known malware☆135Updated last year
- A collection of infosec related scripts and information.☆53Updated last year
- Cuckoo running in a nested hypervisor☆128Updated 5 years ago
- A mapping of used malware names to commonly known family names☆62Updated 2 years ago
- Sandbox feature upgrade with the help of wrapped samples☆76Updated 7 years ago
- Various scripts for different malware families☆106Updated 4 years ago
- This repository contains all public indicators identified by 401trg during the course of our investigations. It also includes relevant ya…☆122Updated 4 years ago
- unXOR will search a XORed file and try to guess the key using known-plaintext attacks.☆144Updated 5 years ago
- PE Import Hash Generator☆79Updated 8 years ago
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆103Updated 5 months ago
- YARA rules for use with ProcFilter☆88Updated 8 years ago
- Parse evtx files and detect use of the DanderSpritz eventlogedit module☆150Updated 8 years ago
- A tool for de-obfuscating PowerShell scripts☆71Updated 6 years ago
- ConventionEngine - A Yara Rulepack for PDB Path Hunting☆37Updated 2 years ago
- Malware/IOC ingestion and processing engine☆108Updated 7 years ago
- Set of Yara rules for finding files using magics headers☆140Updated 5 years ago