Tools to interact with APTnotes reporting/index.
☆108Oct 14, 2020Updated 5 years ago
Alternatives and similar repositories for tools
Users that are interested in tools are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- APTnotes data☆1,781Dec 16, 2024Updated last year
- Azure Deployment Templates for Mandiant Managed Huning☆12Jun 1, 2023Updated 2 years ago
- 🚗 A curated list of resources for learning about vehicle security and car hacking☆15Oct 4, 2021Updated 4 years ago
- A curated list of resources (books, tutorials, courses, tools and vulnerable applications) for learning about Exploit Development☆12May 29, 2017Updated 8 years ago
- A curated list of tools for incident response☆21Sep 24, 2019Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A curated list of awesome threat detection and hunting resources☆10Mar 23, 2018Updated 8 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆47Jun 5, 2017Updated 8 years ago
- This repository contains OpenIOC rules to aid in hunting for indicators of compromise and TTPs focused on Advanced Persistent Threat grou…☆26Oct 3, 2023Updated 2 years ago
- A tool to convert MISP XML files (events and attributes) into graphs☆20May 13, 2017Updated 8 years ago
- Various public documents, whitepapers and articles about APT campaigns☆3,643Jan 1, 2024Updated 2 years ago
- Tool to extract indicators of compromise from security reports in PDF format☆440Feb 24, 2023Updated 3 years ago
- Python libary to normalize Yara signatures☆19Oct 9, 2020Updated 5 years ago
- The ContactDB project was initiated to cover the need for a tool to maintain contacts for CSIRT teams☆37Jan 21, 2022Updated 4 years ago
- Cyber Threat Intelligence - Toolbox☆52Oct 8, 2018Updated 7 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- A map displaying threat actors from the misp-galaxy☆33Jan 16, 2023Updated 3 years ago
- Gets currently logged-on users on domain computers, to see if they are local admins or not.☆10Aug 14, 2019Updated 6 years ago
- A curated list of awesome social engineering resources.☆14May 29, 2017Updated 8 years ago
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆103Mar 21, 2026Updated 2 weeks ago
- ☆14Jan 5, 2021Updated 5 years ago
- ☆10Jul 5, 2020Updated 5 years ago
- APT & CyberCriminal Campaign Collection☆4,054Jul 25, 2024Updated last year
- Indicators of compromise (IOCs) collected from public resources and categorized by Qi-AnXin.☆969Feb 28, 2026Updated last month
- IOC Management and Visualization Tool☆48Dec 8, 2022Updated 3 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Real-time updated lists of U.S. GovCloud IP ranges on Amazon AWS, Microsoft Azure, Google GCP☆18Dec 6, 2024Updated last year
- Repository of resources for configuring a Red Team SIEM using Elastic☆102Jul 10, 2018Updated 7 years ago
- Generic fuzzing wordlist to test for SQLi. Merged from different SQLi wordlists.☆18Jul 24, 2021Updated 4 years ago
- Threat Analysis, Reconnaissance, and Data Intelligence System☆129Aug 28, 2015Updated 10 years ago
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,526Jan 12, 2026Updated 2 months ago
- agent.btz download MALWARE BINARY PROVIDED + POC video☆23Jul 11, 2021Updated 4 years ago
- Cyber Threat Intelligence Repository expressed in STIX 2.0☆2,046Dec 19, 2025Updated 3 months ago
- Public Exploits + Extra-curriculum for OSCE Exam Preparation☆79Sep 9, 2020Updated 5 years ago
- just manipulatin these here tokens yes sir nothing weird☆21Apr 18, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- PowerShell module to play with Kerberos S4U extensions☆52Apr 2, 2017Updated 9 years ago
- A collection of awesome penetration testing resources, tools and other shiny things☆17Feb 11, 2017Updated 9 years ago
- snake-core - the real snake☆15Jul 11, 2023Updated 2 years ago
- Toolset to analyse TLS datasets☆12Aug 7, 2019Updated 6 years ago
- Web app that provides basic navigation and annotation of ATT&CK matrices☆2,352Apr 2, 2026Updated last week
- A collection of resources for Threat Hunters☆915Oct 15, 2024Updated last year
- TTN Ulm particulate matter sensor for Arduino (luftdaten.info project)☆18Jul 10, 2020Updated 5 years ago