eric-erki / APT_CyberCriminal_Campagin_CollectionsLinks
APT & CyberCriminal Campaign Collection
☆15Updated 7 years ago
Alternatives and similar repositories for APT_CyberCriminal_Campagin_Collections
Users that are interested in APT_CyberCriminal_Campagin_Collections are comparing it to the libraries listed below
Sorting:
- Personal compilation of APT malware from whitepaper releases, documents and own research☆267Updated 6 years ago
- This repo is a collection of Ransomware reports from vendors, researchers, etc.☆120Updated 3 years ago
- A curated list of malware repositories, trackers and malware analysis tools☆91Updated 2 years ago
- ☆128Updated 10 months ago
- Compiles a json dataset using public sources that contains properties to aid in the detection and mitigation of over 1000 variants of ran…☆72Updated 2 years ago
- A personal malware feed which downloads and classifies the latest samples from Malshare.☆23Updated 4 years ago
- Cuckoo running in a nested hypervisor☆128Updated 5 years ago
- Collection of various files from infected hosts☆75Updated 3 years ago
- Valhalla API Client☆70Updated 2 years ago
- Random hunting ordiented yara rules☆98Updated 2 years ago
- Hatching Triage public command-line utility and API library.☆74Updated 2 years ago
- ☆50Updated 2 years ago
- Repository of yara rules☆60Updated 3 years ago
- Tools to interact with APTnotes reporting/index.☆107Updated 5 years ago
- Vthunting is a tiny script used to generate report about Virus Total hunting and send it by email, slack or telegram.☆167Updated 2 years ago
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆87Updated 3 years ago
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆119Updated 2 years ago
- This tool maps a file's behavior on MITRE ATT&CK matrix.☆59Updated 5 years ago
- Personal research and publication on malware families☆142Updated 11 months ago
- Repository containing IOCs, CSV and MISP JSON from our blogs☆83Updated 4 years ago
- Proofpoint - Emerging Threats - Threat Research tools + publicly shared intel and documentation☆80Updated 3 months ago
- ☆46Updated 2 years ago
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆103Updated 5 months ago
- Malware Analysis, Threat Intelligence and Reverse Engineering: LABS☆82Updated 4 years ago
- HXTool is an extended user interface for the FireEye HX Endpoint product. HXTool can be installed on a dedicated server or on your physic…☆84Updated last year
- Collection of YARA signatures from individual research☆45Updated 2 years ago
- Notes and IoCs of fresh malware☆59Updated last year
- Malware similarity platform with modularity in mind.☆79Updated 4 years ago
- Standardized Malware Analysis Tool☆56Updated 4 years ago
- ATT&CK Evaluations website (DEPRECATED)☆62Updated 4 years ago