RedDrip7 / APT_Digital_WeaponLinks
Indicators of compromise (IOCs) collected from public resources and categorized by Qi-AnXin.
☆952Updated 2 months ago
Alternatives and similar repositories for APT_Digital_Weapon
Users that are interested in APT_Digital_Weapon are comparing it to the libraries listed below
Sorting:
- Indicators from Unit 42 Public Reports☆725Updated 2 months ago
- Utilities for MITRE™ ATT&CK☆1,042Updated last month
- ☆713Updated 3 years ago
- APT Malware Dataset Containing over 3,500 State-Sponsored Malware Samples☆348Updated 2 years ago
- Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups☆717Updated 2 years ago
- APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the …☆1,381Updated 11 months ago
- ☆1,112Updated last year
- Interesting APT Report Collection And Some Special IOCs☆2,688Updated this week
- Guidance for mitigation web shells. #nsacyber☆982Updated 2 years ago
- Pull some Malware samples here for other security researchers/malware analyst's to analyze and play with.☆173Updated last year
- PCAP Samples for Different Post Exploitation Techniques☆366Updated 4 years ago
- Attack Detection☆1,360Updated 3 years ago
- Open Source EDR for Windows☆1,277Updated 2 years ago
- Defences against Cobalt Strike☆1,290Updated 3 years ago
- Elemental - An ATT&CK Threat Library☆319Updated 2 years ago
- Scan files or process memory for CobaltStrike beacons and parse their configuration☆917Updated 4 years ago
- A curated list of awesome resources related to Mitre ATT&CK™ Framework☆612Updated 6 years ago
- APTnotes data☆1,751Updated 10 months ago
- Some results of my DGA reversing efforts☆677Updated 3 weeks ago
- MITRE ATT&CK Website☆548Updated this week
- ☆33Updated 7 years ago
- Threat Intel IoCs + bits and pieces of dark matter☆419Updated 4 months ago
- 威胁情报,恶意样本分析,开源Malware代码收集☆346Updated 5 years ago
- Extract and aggregate threat intelligence.☆881Updated last year
- yarGen is a generator for YARA rules☆1,726Updated 2 weeks ago
- 常见的攻击行为监测特征及方法,涵盖端点和流量,未包含PowerShell和Sysmon。预祝运营生活愉快!☆640Updated 2 weeks ago
- ☆1,089Updated 6 years ago
- Setup scripts for my Malware Analysis VMs☆256Updated 3 years ago
- Defanged Indicator of Compromise (IOC) Extractor.☆550Updated last year
- Repository of YARA rules made by Trellix ATR Team☆614Updated 7 months ago