botherder / targetedthreatsView external linksLinks
Collection of IOCs related to targeting of civil society
☆189Nov 11, 2021Updated 4 years ago
Alternatives and similar repositories for targetedthreats
Users that are interested in targetedthreats are comparing it to the libraries listed below
Sorting:
- The Suspicious Email Submitter is a discontinued browser extension (Chrome, Chromium, Firefox) for the easy submission of suspicious emai…☆15Mar 6, 2023Updated 2 years ago
- Baseline organizational policies and practices☆10Apr 17, 2017Updated 8 years ago
- DPS' Lightweight Investigation Notebook☆433Dec 31, 2023Updated 2 years ago
- The repository contains IOCs in CSV format for APT, Cyber Crimes, Malware and Trojan and whatever I found as part of hunting and research☆12Jun 10, 2017Updated 8 years ago
- Tools☆13Apr 20, 2023Updated 2 years ago
- A set of Maltego transforms for VirusTotal Public API v2.0. This set has the added functionality of caching queries on a daily basis to s…☆82Nov 29, 2015Updated 10 years ago
- Simple script for PGP encrypted newsletter☆26Feb 13, 2016Updated 10 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Jan 29, 2013Updated 13 years ago
- Citizen Lab Malware Reports☆279Oct 4, 2020Updated 5 years ago
- Unpack MIME attachments from a file and check them against virustotal.com☆44Mar 11, 2016Updated 9 years ago
- A collection of sources of indicators of compromise.☆947May 8, 2025Updated 9 months ago
- Tool to extract indicators of compromise from security reports in PDF format☆439Feb 24, 2023Updated 2 years ago
- Codex Gigas malware DNA profiling search engine discovers malware patterns and characteristics assisting individuals who are attracted in…☆156Dec 20, 2019Updated 6 years ago
- Protocol Analysis/Decoder Framework☆497Dec 19, 2022Updated 3 years ago
- Deception based detection techniques mapped to the MITRE’s ATT&CK framework☆291Oct 28, 2017Updated 8 years ago
- Flexible framework that allows automation to process cyber threat information and update endpoint defense tools.☆20Oct 24, 2018Updated 7 years ago
- ☆16Oct 23, 2015Updated 10 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Feb 26, 2015Updated 10 years ago
- SAFETAG is a curricula, a methodology, and a framework for security auditors working with advocacy groups.☆82Updated this week
- Battalion is a tool used to automate reconnaissance and assist both pentesters and internal security/admin teams.☆43Jan 13, 2026Updated last month
- Conceptual Methods for Finding Commonalities in Macho Files☆12Mar 21, 2024Updated last year
- An environment for comprehensive, automated analysis of web-based exploits, based on Cuckoo sandbox.☆124Aug 10, 2015Updated 10 years ago
- A Yara rule generator for finding related samples and hunting☆162Sep 11, 2022Updated 3 years ago
- 16,432 Free Yara rules created by☆390Jun 1, 2019Updated 6 years ago
- PowerShell Module Bindings for Capstone/Keystone☆25Nov 15, 2016Updated 9 years ago
- Malicious HTTP traffic explorer☆725Mar 16, 2023Updated 2 years ago
- Ruby Oracle Security Scanner☆16Jul 9, 2012Updated 13 years ago
- The GOSINT framework is a project used for collecting, processing, and exporting high quality indicators of compromise (IOCs).☆554May 9, 2023Updated 2 years ago
- Archive Mirror for recently republished PoC/Exploit code☆17Nov 26, 2017Updated 8 years ago
- Artifact analysis tools by JPCERT/CC Analysis Center☆464Aug 14, 2025Updated 6 months ago
- IOC (Indicator of Compromise) Extractor: a program to help extract IOCs from text files.☆134Jan 14, 2016Updated 10 years ago
- A tool for scrapping the possible malware from the Wikileaks AKP leak☆101Oct 24, 2016Updated 9 years ago
- Machinae Security Intelligence Collector☆538May 15, 2024Updated last year
- Indicator Extractor☆141Jul 14, 2018Updated 7 years ago
- Fancy Bear Source Code☆263Jan 9, 2017Updated 9 years ago
- ☆24Sep 28, 2022Updated 3 years ago
- Lazy Office Analyzer☆121Feb 15, 2017Updated 9 years ago
- PowerShell No Agent Hunting☆111Apr 23, 2018Updated 7 years ago
- Binary analysis and management framework☆1,557Jun 7, 2023Updated 2 years ago