This repository contains the website and the tools which are part of the joint research between Check Point Research and Intezer to map the connections inside the APT Ecosystem of Russia.
☆109Oct 30, 2019Updated 6 years ago
Alternatives and similar repositories for APT-Ecosystem
Users that are interested in APT-Ecosystem are comparing it to the libraries listed below
Sorting:
- The Purpose of this research tool is to provide a Python client into RiskIQ API services.☆22Feb 4, 2021Updated 5 years ago
- Simple decrypter for strings used in SamSam Ransomware samples.☆18Feb 21, 2020Updated 6 years ago
- Telsy CTI Research Team☆57Dec 15, 2020Updated 5 years ago
- A collection of Indicators of Compromise (IoCs), most aligning with samples derived from the signatures in the YARA-Signatures repo☆29Jun 11, 2020Updated 5 years ago
- Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups☆723Dec 26, 2022Updated 3 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 6 years ago
- Misc malware stuff☆11Sep 30, 2020Updated 5 years ago
- Parse a report and import the events into MISP☆30Oct 19, 2015Updated 10 years ago
- ☆16Apr 30, 2024Updated last year
- Some rules, scripts of some use to us☆11Oct 25, 2024Updated last year
- Enables dynamic translation of structured data between formats☆14Dec 14, 2018Updated 7 years ago
- Emulates the VirusTotal "vt" YARA module for livehunt rule debugging/testing☆24May 29, 2023Updated 2 years ago
- Kaspersky's GReAT KLara☆732Jul 24, 2024Updated last year
- Mobile Application Vulnerability Detection☆12May 19, 2017Updated 8 years ago
- Plugins for the Viper Framework☆14Sep 21, 2019Updated 6 years ago
- Providing timelines based on OSINT Reports☆31Jun 21, 2023Updated 2 years ago
- Automatically create YARA rules from malicious documents.☆211May 16, 2022Updated 3 years ago
- YARA Rule Strings Statistics Calculator and Malware Research Helper☆14Jul 24, 2021Updated 4 years ago
- ☆23Mar 17, 2024Updated last year
- Awesome VirusTotal Intelligence Search Queries☆332May 16, 2023Updated 2 years ago
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆53Mar 16, 2018Updated 7 years ago
- Code for Benchmarking two ML Approaches performing Authorship Attribution☆43Apr 5, 2022Updated 3 years ago
- Automatic YARA rule generation for Malpedia☆168Sep 8, 2022Updated 3 years ago
- Indicators of compromise (IOCs) collected from public resources and categorized by Qi-AnXin.☆961Feb 28, 2026Updated last week
- Extract information from MISP via the API☆16Jul 18, 2016Updated 9 years ago
- Sighting DB is designed to scale writing and reading a count of attributes, tracking when if was first and last seen☆17Apr 11, 2024Updated last year
- A list of JARM hashes for different ssl implementations used by some C2/red team tools.☆144Apr 20, 2023Updated 2 years ago
- Converting data from services like Censys and Shodan to a common data model☆52Feb 22, 2026Updated last week
- Generates YARA rules to detect malware using API hashing☆17Mar 16, 2021Updated 4 years ago
- D-Scan project for office document analysis and generating flow diagram of macro in documents. For demo visit☆29Jan 10, 2026Updated last month
- Interesting APT Report Collection And Some Special IOCs☆2,929Updated this week
- Serverless, real-time, ClamAV+Yara scanning for your S3 Buckets☆33Jan 14, 2026Updated last month
- Pull some Malware samples here for other security researchers/malware analyst's to analyze and play with.☆173May 29, 2024Updated last year
- Django web interface for managing Yara rules☆196Jul 28, 2018Updated 7 years ago
- Collect autorun records from running system☆60Jan 21, 2022Updated 4 years ago
- ☆53Apr 22, 2015Updated 10 years ago
- A tool for de-obfuscating PowerShell scripts☆71Apr 24, 2019Updated 6 years ago
- ☆128Feb 2, 2025Updated last year
- ☆98Oct 7, 2020Updated 5 years ago