APT Malware Dataset Containing over 3,500 State-Sponsored Malware Samples
☆373Nov 10, 2022Updated 3 years ago
Alternatives and similar repositories for APTMalware
Users that are interested in APTMalware are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Code for Benchmarking two ML Approaches performing Authorship Attribution☆42Apr 5, 2022Updated 4 years ago
- Pull some Malware samples here for other security researchers/malware analyst's to analyze and play with.☆172May 29, 2024Updated last year
- Indicators of compromise (IOCs) collected from public resources and categorized by Qi-AnXin.☆968Feb 28, 2026Updated 2 months ago
- APT & CyberCriminal Campaign Collection☆4,074Jul 25, 2024Updated last year
- Artefacts for Survivalism: Systematic Analysis of Windows Malware Living-Off-The-Land☆11Jul 7, 2021Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆39Aug 8, 2024Updated last year
- Sophos-ReversingLabs 20 million sample dataset☆699Apr 7, 2021Updated 5 years ago
- A dataset containing APT group related articles and MITRE ATT&CK technique descriptions☆18Aug 14, 2019Updated 6 years ago
- Malware dataset for security researchers, data scientists. Public malware dataset generated by Cuckoo Sandbox based on Windows OS API cal…☆259Nov 22, 2021Updated 4 years ago
- Interesting APT Report Collection And Some Special IOCs☆2,979Updated this week
- APTnotes data☆1,786Dec 16, 2024Updated last year
- ☆128May 3, 2023Updated 3 years ago
- ☆98Oct 7, 2020Updated 5 years ago
- A repository of open source reports on different malware families used in targeted cyber intrusions ("APT").☆55Jun 27, 2015Updated 10 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆32Jul 22, 2022Updated 3 years ago
- Codes and data for USENIX Security 24 paper "MAGIC: Detecting Advanced Persistent Threats via Masked Graph Representation Learning"☆142Oct 24, 2024Updated last year
- Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups☆726Dec 26, 2022Updated 3 years ago
- Malware sample library.☆598Nov 21, 2023Updated 2 years ago
- Malware captured with honeypots☆38Oct 2, 2017Updated 8 years ago
- The Tangled Genealogy of IoT Malware☆12Jan 5, 2021Updated 5 years ago
- APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the …☆1,408Nov 7, 2024Updated last year
- ☆21Sep 5, 2022Updated 3 years ago
- ☆101Nov 26, 2020Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- AttacKG: Constructing Knowledge-enhanced Attack Graphs from Cyber Threat Intelligence Reports☆181Mar 23, 2023Updated 3 years ago
- A python app to predict Att&ck tactics and techniques from cyber threat reports☆128Nov 15, 2023Updated 2 years ago
- ☆87Mar 29, 2023Updated 3 years ago
- This repository contains OpenIOC rules to aid in hunting for indicators of compromise and TTPs focused on Advanced Persistent Threat grou…☆26Oct 3, 2023Updated 2 years ago
- Malware source code samples leaked online uploaded to GitHub for those who want to analyze the code☆317Jan 13, 2021Updated 5 years ago
- Sources code extracted from malwares for analysis☆40Mar 10, 2023Updated 3 years ago
- Exercise writeups from the book Practical Malware Analysis.☆248Aug 9, 2023Updated 2 years ago
- source code☆183May 6, 2019Updated 7 years ago
- Elastic Malware Benchmark for Empowering Researchers☆1,152Nov 22, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A collection of malware samples and relevant dissection information, most probably referenced from http://blog.inquest.net☆935Mar 26, 2024Updated 2 years ago
- Anti-virus artifacts. Listing APIs hooked by: Avira, BitDefender, F-Secure, MalwareBytes, Norton, TrendMicro, and WebRoot.☆761Nov 16, 2021Updated 4 years ago
- Code for "MalGraph: Hierarchical Graph Neural Networks for Robust Windows Malware Detection"☆51Jan 10, 2022Updated 4 years ago
- ☆717Oct 28, 2022Updated 3 years ago
- AVClass malware labeling tool☆486Oct 22, 2024Updated last year
- A Novel and Modular Solution for Extracting All STIX Objects in CTI Reports☆32Aug 21, 2023Updated 2 years ago
- Experiments on C/C++ Exploits☆22Jun 30, 2020Updated 5 years ago