Tools to interact with APTnotes reporting/index.
☆108Oct 14, 2020Updated 5 years ago
Alternatives and similar repositories for tools
Users that are interested in tools are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- APTnotes data☆1,786Dec 16, 2024Updated last year
- Azure Deployment Templates for Mandiant Managed Huning☆12Jun 1, 2023Updated 2 years ago
- 🚗 A curated list of resources for learning about vehicle security and car hacking☆15Oct 4, 2021Updated 4 years ago
- A curated list of awesome forensic analysis tools and resources☆16Oct 3, 2018Updated 7 years ago
- A curated list of resources (books, tutorials, courses, tools and vulnerable applications) for learning about Exploit Development☆12May 29, 2017Updated 8 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A curated list of tools for incident response☆21Sep 24, 2019Updated 6 years ago
- A curated list of awesome threat detection and hunting resources☆10Mar 23, 2018Updated 8 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆47Jun 5, 2017Updated 8 years ago
- A tool to convert MISP XML files (events and attributes) into graphs☆20May 13, 2017Updated 8 years ago
- Various public documents, whitepapers and articles about APT campaigns☆3,646Jan 1, 2024Updated 2 years ago
- This contains common OSCP local exploits and enumeration scripts☆12Sep 18, 2015Updated 10 years ago
- Tool to extract indicators of compromise from security reports in PDF format☆439Feb 24, 2023Updated 3 years ago
- Python libary to normalize Yara signatures☆19Oct 9, 2020Updated 5 years ago
- The ContactDB project was initiated to cover the need for a tool to maintain contacts for CSIRT teams☆37Jan 21, 2022Updated 4 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups☆726Dec 26, 2022Updated 3 years ago
- Cyber Threat Intelligence - Toolbox☆52Oct 8, 2018Updated 7 years ago
- A map displaying threat actors from the misp-galaxy☆33Jan 16, 2023Updated 3 years ago
- Gets currently logged-on users on domain computers, to see if they are local admins or not.☆10Aug 14, 2019Updated 6 years ago
- A curated list of awesome social engineering resources.☆14May 29, 2017Updated 8 years ago
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆103Mar 21, 2026Updated last month
- ☆14Jan 5, 2021Updated 5 years ago
- ☆10Jul 5, 2020Updated 5 years ago
- APT & CyberCriminal Campaign Collection☆4,070Jul 25, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Indicators of compromise (IOCs) collected from public resources and categorized by Qi-AnXin.☆969Feb 28, 2026Updated 2 months ago
- Repository of resources for configuring a Red Team SIEM using Elastic☆102Jul 10, 2018Updated 7 years ago
- Real-time updated lists of U.S. GovCloud IP ranges on Amazon AWS, Microsoft Azure, Google GCP☆17Dec 6, 2024Updated last year
- Generic fuzzing wordlist to test for SQLi. Merged from different SQLi wordlists.☆18Jul 24, 2021Updated 4 years ago
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,541Jan 12, 2026Updated 3 months ago
- agent.btz download MALWARE BINARY PROVIDED + POC video☆23Jul 11, 2021Updated 4 years ago
- Cyber Threat Intelligence Repository expressed in STIX 2.0☆2,054Updated this week
- Public Exploits + Extra-curriculum for OSCE Exam Preparation☆79Sep 9, 2020Updated 5 years ago
- just manipulatin these here tokens yes sir nothing weird☆21Apr 18, 2022Updated 4 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- PowerShell module to play with Kerberos S4U extensions☆52Apr 2, 2017Updated 9 years ago
- snake-core - the real snake☆15Jul 11, 2023Updated 2 years ago
- Device profile: Define acceptable amounts of traffic for your devices and see a report of outliers.☆16Jan 28, 2020Updated 6 years ago
- Toolset to analyse TLS datasets☆12Aug 7, 2019Updated 6 years ago
- Web app that provides basic navigation and annotation of ATT&CK matrices☆2,368Apr 21, 2026Updated last week
- A collection of resources for Threat Hunters☆917Oct 15, 2024Updated last year
- A web application to streamline the development of STIGs from SRGs☆85Apr 12, 2026Updated 2 weeks ago