RedDrip7 / APT_Digital_WeaponLinks
Indicators of compromise (IOCs) collected from public resources and categorized by Qi-AnXin.
☆957Updated 3 months ago
Alternatives and similar repositories for APT_Digital_Weapon
Users that are interested in APT_Digital_Weapon are comparing it to the libraries listed below
Sorting:
- Utilities for MITRE™ ATT&CK☆1,045Updated 2 months ago
- Indicators from Unit 42 Public Reports☆727Updated 3 months ago
- ☆713Updated 3 years ago
- APT Malware Dataset Containing over 3,500 State-Sponsored Malware Samples☆353Updated 3 years ago
- Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups☆721Updated 2 years ago
- Attack Detection☆1,360Updated 3 years ago
- ☆1,118Updated last year
- Guidance for mitigation web shells. #nsacyber☆982Updated 2 years ago
- APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the …☆1,397Updated last year
- PCAP Samples for Different Post Exploitation Techniques☆367Updated 4 years ago
- Interesting APT Report Collection And Some Special IOCs☆2,769Updated this week
- APTnotes data☆1,759Updated 11 months ago
- Open Source EDR for Windows☆1,280Updated 2 years ago
- Elemental - An ATT&CK Threat Library☆320Updated 3 years ago
- Pull some Malware samples here for other security researchers/malware analyst's to analyze and play with.☆174Updated last year
- Scan files or process memory for CobaltStrike beacons and parse their configuration☆919Updated 4 years ago
- Some results of my DGA reversing efforts☆682Updated 2 months ago
- Defences against Cobalt Strike☆1,294Updated 3 years ago
- A curated list of awesome resources related to Mitre ATT&CK™ Framework☆612Updated 6 years ago
- Threat Intel IoCs + bits and pieces of dark matter☆420Updated last month
- ☆1,090Updated 6 years ago
- yarGen is a generator for YARA rules☆1,748Updated last month
- 威胁情报,恶意样本分析,开源Malware代码收集☆349Updated 6 years ago
- Repository of YARA rules made by Trellix ATR Team☆620Updated 8 months ago
- Utilities for Sysmon☆1,562Updated 2 months ago
- Clusters and elements to attach to MISP events or attributes (like threat actors)☆591Updated this week
- A collection of red team and adversary emulation resources developed and released by MITRE.☆524Updated 4 years ago
- An easy ATT&CK-based Sysmon hunting tool, showing in Blackhat USA 2019 Arsenal☆203Updated 3 years ago
- MITRE ATT&CK Website☆554Updated 2 weeks ago
- Setup scripts for my Malware Analysis VMs☆257Updated 3 years ago