andreacristaldi / APTmap
Graphical map of known Advanced Persistent Threats
☆34Updated 11 months ago
Related projects: ⓘ
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆57Updated 8 months ago
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆26Updated last year
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆59Updated 2 months ago
- ☆31Updated 5 months ago
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆48Updated last year
- Data breaches, Leaks, Malwares Forums List <Please Use Vpn/TOR don't click on Link directly bad OPSEC>☆40Updated this week
- An offline Phishing Email Analyzer. Enabling non-techies to analyze phishing emails automatically!☆55Updated 10 months ago
- Linux Baseline and Forensic Triage Tool - BETA☆51Updated 2 years ago
- ☆13Updated last year
- ☆14Updated last year
- Virus Total Free - IOC parser and report generator☆22Updated last year
- Repository of tools and resources for analyzing Docker containers☆57Updated 10 months ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆108Updated 5 months ago
- Sniffing out well-known threat groups☆28Updated last month
- Track C2 servers, tools, and botnets over time by framework and location☆35Updated 10 months ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆81Updated 4 months ago
- CarbonBlack EDR detection rules and response actions☆70Updated last week
- A full analysis report detailing as much as possible of a Malware or a Threat☆24Updated 3 months ago
- IOC Collection 2022☆55Updated last year
- A collection of Script for Red Team & Incidence Response☆11Updated 2 years ago
- Placeholder for my detection repo and misc detection engineering content☆43Updated 11 months ago
- ☆42Updated 5 months ago
- ☆15Updated 10 months ago
- ☆17Updated this week
- Slides of my public talks☆46Updated 9 months ago
- ☆34Updated last year
- A network logging tool that logs per process activities☆32Updated last year
- BlueBox Malware analysis Box and Cyber threat intelligence.☆38Updated 2 years ago
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆37Updated last year
- ☆23Updated this week