Indicators of compromise (IOCs) collected from public resources and categorized by Qi-AnXin.
☆964Feb 28, 2026Updated 3 weeks ago
Alternatives and similar repositories for APT_Digital_Weapon
Users that are interested in APT_Digital_Weapon are comparing it to the libraries listed below
Sorting:
- Interesting APT Report Collection And Some Special IOCs☆2,955Updated this week
- APT & CyberCriminal Campaign Collection☆4,043Jul 25, 2024Updated last year
- Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups☆723Dec 26, 2022Updated 3 years ago
- BCS(北京网络安全大会)2019 红队行动会议重点内容☆819Sep 4, 2019Updated 6 years ago
- Indicators from Unit 42 Public Reports☆726Aug 17, 2025Updated 7 months ago
- Various public documents, whitepapers and articles about APT campaigns☆3,643Jan 1, 2024Updated 2 years ago
- Indicators of Compromises (IOC) of our various investigations☆1,933Mar 10, 2026Updated last week
- Scan files or process memory for CobaltStrike beacons and parse their configuration☆921Aug 19, 2021Updated 4 years ago
- YARA signature and IOC database for my scanners and tools☆2,884Mar 9, 2026Updated last week
- 红队基础设施自动化部署工具☆853Jan 4, 2023Updated 3 years ago
- IOC from articles, tweets for archives☆318Dec 12, 2023Updated 2 years ago
- APT Malware Dataset Containing over 3,500 State-Sponsored Malware Samples☆370Nov 10, 2022Updated 3 years ago
- Windows Events Attack Samples☆2,526Jan 24, 2023Updated 3 years ago
- ATTCK-PenTester-Book☆1,153Feb 1, 2020Updated 6 years ago
- APTnotes data☆1,777Dec 16, 2024Updated last year
- Kaspersky's GReAT KLara☆733Jul 24, 2024Updated last year
- Pull some Malware samples here for other security researchers/malware analyst's to analyze and play with.☆173May 29, 2024Updated last year
- Hunts out CobaltStrike beacons and logs operator command output☆951Sep 4, 2024Updated last year
- ☆715Oct 28, 2022Updated 3 years ago
- APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the …☆1,405Nov 7, 2024Updated last year
- AD Security Intrusion Detection System☆1,322Mar 31, 2023Updated 2 years ago
- Repository of yara rules☆4,730Apr 17, 2024Updated last year
- Cobalt Strike系列☆2,416Dec 3, 2023Updated 2 years ago
- ☆1,133Dec 19, 2023Updated 2 years ago
- 个人域渗透学习笔记☆1,802Feb 7, 2020Updated 6 years ago
- Cobalt Strike插件 - RDP日志取证&清除☆363Dec 23, 2019Updated 6 years ago
- ATT&CK实操☆373Sep 7, 2019Updated 6 years ago
- Attack Detection☆1,360Aug 31, 2022Updated 3 years ago
- Threat Intel IoCs + bits and pieces of dark matter. Published by Gen Threat Labs.☆437Mar 11, 2026Updated last week
- 常见的攻击行为监测特征及方法,涵盖端点和流量,未包含PowerShell和Sysmon。预祝运营生活愉快!☆645Jan 18, 2026Updated 2 months ago
- ☆159Aug 4, 2020Updated 5 years ago
- Practice Go programming and implement CobaltStrike's Beacon in Go☆1,263Oct 2, 2020Updated 5 years ago
- sharpwmi是一个基于rpc的横向移动工具,具有上传文件和执行命令功能。☆715Aug 3, 2021Updated 4 years ago
- ☆2,666Mar 5, 2024Updated 2 years ago
- List of Awesome CobaltStrike Resources☆4,395Sep 20, 2023Updated 2 years ago
- Personal compilation of APT malware from whitepaper releases, documents and own research☆266Feb 7, 2019Updated 7 years ago
- 威胁情报,恶意样本分析,开源Malware代码收集☆349Nov 1, 2019Updated 6 years ago
- Repository of YARA rules made by Trellix ATR Team☆627Mar 18, 2025Updated last year
- A collection of pentest and development tips☆1,126May 26, 2022Updated 3 years ago