Tools to interact with APTnotes reporting/index.
☆109Oct 14, 2020Updated 5 years ago
Alternatives and similar repositories for tools
Users that are interested in tools are comparing it to the libraries listed below
Sorting:
- APTnotes data☆1,773Dec 16, 2024Updated last year
- Azure Deployment Templates for Mandiant Managed Huning☆12Jun 1, 2023Updated 2 years ago
- The ContactDB project was initiated to cover the need for a tool to maintain contacts for CSIRT teams☆37Jan 21, 2022Updated 4 years ago
- This contains common OSCP local exploits and enumeration scripts☆12Sep 18, 2015Updated 10 years ago
- A curated list of resources (books, tutorials, courses, tools and vulnerable applications) for learning about Exploit Development☆12May 29, 2017Updated 8 years ago
- 🚗 A curated list of resources for learning about vehicle security and car hacking☆15Oct 4, 2021Updated 4 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆47Jun 5, 2017Updated 8 years ago
- Repository of resources for configuring a Red Team SIEM using Elastic☆101Jul 10, 2018Updated 7 years ago
- just manipulatin these here tokens yes sir nothing weird☆22Apr 18, 2022Updated 3 years ago
- A curated list of awesome forensic analysis tools and resources☆16Oct 3, 2018Updated 7 years ago
- Public Exploits + Extra-curriculum for OSCE Exam Preparation☆79Sep 9, 2020Updated 5 years ago
- A curated list of tools for incident response☆21Sep 24, 2019Updated 6 years ago
- Various public documents, whitepapers and articles about APT campaigns☆3,647Jan 1, 2024Updated 2 years ago
- Tool to extract indicators of compromise from security reports in PDF format☆439Feb 24, 2023Updated 3 years ago
- This is a script to import Cisco Talos's IP Blacklist into a Tag (Host Group) within Stealthwatch. This will also optionally create a Cu…☆11May 22, 2023Updated 2 years ago
- Strstr with user-supplied needle and filename as a BOF.☆32Sep 27, 2021Updated 4 years ago
- Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups☆723Dec 26, 2022Updated 3 years ago
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆102Jul 10, 2025Updated 7 months ago
- SSDT_process_hide_protect☆10Jul 17, 2014Updated 11 years ago
- A curated list of awesome threat detection and hunting resources☆10Mar 23, 2018Updated 7 years ago
- (PoC) Tiny Excel BIFF8 Generator, to Embedded 4.0 Macros in xls files without Excel.☆44Aug 1, 2021Updated 4 years ago
- Technical cyber security resources across the NIST cyber security framework lifecycle☆11Apr 28, 2021Updated 4 years ago
- Gets currently logged-on users on domain computers, to see if they are local admins or not.☆10Aug 14, 2019Updated 6 years ago
- Spiders a website using the darknet via Tor☆12Jun 18, 2017Updated 8 years ago
- ☆48Nov 18, 2020Updated 5 years ago
- Volatility 3 plugins to extract a module as complete as possible☆12Jun 13, 2023Updated 2 years ago
- snake-core - the real snake☆15Jul 11, 2023Updated 2 years ago
- Defending IaaS with ATT&CK is a project to create a collection of ATT&CK techniques relevant to a Linux IaaS environment, as well as a me…☆14May 28, 2025Updated 9 months ago
- ☆11Aug 19, 2017Updated 8 years ago
- ☆29May 10, 2024Updated last year
- A map displaying threat actors from the misp-galaxy☆33Jan 16, 2023Updated 3 years ago
- Cyber Threat Intelligence Repository expressed in STIX 2.0☆2,033Dec 19, 2025Updated 2 months ago
- Web app that provides basic navigation and annotation of ATT&CK matrices☆2,329Updated this week
- Etwti-UnhookPOC just for test☆12Aug 23, 2022Updated 3 years ago
- Command line tool to check URLs against Google Safe Browsing malware/phishing lists.☆15Sep 9, 2016Updated 9 years ago
- Docker projects to retain beacon source IPs using C2 relaying infra☆11Feb 25, 2019Updated 7 years ago
- ☆10Jul 5, 2020Updated 5 years ago
- Open source tools mentioned in Advanced Penetration Testing Hacking the World's Most Secure Networks☆11Feb 12, 2018Updated 8 years ago
- A dotnet executable to get an Entra token in an authenticated runtime☆16Oct 30, 2024Updated last year