Graphical map of known Advanced Persistent Threats
☆65Jan 31, 2026Updated 3 months ago
Alternatives and similar repositories for APTmap
Users that are interested in APTmap are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- GrizzlyTunnel is a automation script designed to create seamless Layer 3 VPN like tunnels over SSH.☆25Dec 18, 2024Updated last year
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆31Jul 19, 2024Updated last year
- Living of the Land of Free SaaS☆75Mar 22, 2026Updated 2 months ago
- Exploit scripts☆12Apr 10, 2022Updated 4 years ago
- ☆12Dec 14, 2016Updated 9 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Process doppelganging POC using direct system calls, PPID spoofing and dropbox as an external delivery channel for the payload.☆17Jan 7, 2021Updated 5 years ago
- Swagger UI >=3.14.1 < 3.38.0 XSS payload☆24Mar 31, 2024Updated 2 years ago
- IR drill plateform☆23Jul 29, 2025Updated 9 months ago
- ☆16Jun 23, 2024Updated last year
- Position and velocity PID control of a DC motor using LabView and Arduino☆15Apr 23, 2018Updated 8 years ago
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆104Dec 13, 2023Updated 2 years ago
- ☆19Mar 26, 2026Updated last month
- ☆48Nov 14, 2021Updated 4 years ago
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆35Nov 29, 2023Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Tools for automatically building a Debian APT repository for Phusion Passenger☆20May 5, 2026Updated 2 weeks ago
- Analyse metabolic stability predictions using SHapley Additive exPlanations.☆11Jul 26, 2023Updated 2 years ago
- Proof of Concept: HTTP/2 CONTINUATION Flood☆10Apr 7, 2024Updated 2 years ago
- Silent Cleanup UAC Bypass POC☆11Dec 15, 2019Updated 6 years ago
- Lightweight throttle layer for alloy providers☆16Mar 10, 2025Updated last year
- A dump of all the scripts that I make☆19Jul 4, 2021Updated 4 years ago
- PowerShell script to DCSync NT-Hashes from an Active Directory Domain Controller (DC)☆17Feb 6, 2026Updated 3 months ago
- From C, Rust or Zig to binary shellcode compiler based on Mingw gcc. It allows using Win32 APIs and standard libraries without any change…☆53Mar 16, 2026Updated 2 months ago
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆138Jul 19, 2024Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A generative deep learning model based on GAN architecture was implemented to generate synthetic network data (benign and malicious) alik…☆10Oct 23, 2021Updated 4 years ago
- Read Windows message table entries.☆11Feb 5, 2023Updated 3 years ago
- ☆16May 3, 2024Updated 2 years ago
- A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.☆25Jan 4, 2017Updated 9 years ago
- Using Bayesian inference to mine rule sets☆12Jan 9, 2020Updated 6 years ago
- ☆13Feb 22, 2024Updated 2 years ago
- ☆11Sep 15, 2024Updated last year
- CATANA - CUT your Wordlist!☆16Oct 2, 2022Updated 3 years ago
- A curated list of awesome malware analysis tools and resources☆14Mar 31, 2016Updated 10 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Remote Task Scheduler Enumeration☆13Jul 9, 2024Updated last year
- This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server (interface) o…☆90Jul 19, 2024Updated last year
- Collection of rules created using YARA-Signator over Malpedia☆143Jan 6, 2026Updated 4 months ago
- Search Termux Commands and Guide in Termux !!☆12Apr 9, 2026Updated last month
- Repository created to share information about tactics, techniques and procedures used by threat actors. Initially with ransomware groups …☆407Jan 29, 2026Updated 3 months ago
- A basic username enumeration and password spraying tool aimed at spraying Microsoft's DOM based authentication using selenium.☆36Nov 27, 2023Updated 2 years ago
- An AWS Pentesting tool that lets you use one-liner commands to backdoor an AWS account's resources with a rogue AWS account - or share th…☆12Feb 16, 2021Updated 5 years ago