giorgioditizio / APTs-databaseLinks
A repository with data about APTs
☆12Updated 2 years ago
Alternatives and similar repositories for APTs-database
Users that are interested in APTs-database are comparing it to the libraries listed below
Sorting:
- Extensible framework for analyzing publicly available information about vulnerabilities☆115Updated 3 weeks ago
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆29Updated last month
- Harvest Linux forensic data for operational triage of an event.☆51Updated 11 months ago
- BlackBerry Threat Research & Intelligence☆98Updated last year
- This repository contains the code and PCAPS used for the SANS webinar, "Hacking Proprietary Protocols" given on February 23, 2021.☆34Updated 3 years ago
- Enterprise Response Model & Common Knowledge☆36Updated last year
- Aggregated Indicators of Compromise collected and cross-verified from multiple open and community-supported sources, enriched and ranked …☆34Updated 9 months ago
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆95Updated 4 years ago
- The project was moved here https://github.com/atomic-threat-coverage/atomic-threat-coverage☆24Updated 5 years ago
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆34Updated last month
- This CALDERA Plugin converts Adversary Emulation Plans from the Center for Threat Informed Defense☆30Updated 2 months ago
- A collection of tips for using MISP.☆74Updated 5 months ago
- A Jupyter notebook to assist with the analysis of the output generated from Volatility memory extraction framework.☆95Updated 2 years ago
- A zero dependency and customizable Python library for scanning Windows and Linux process memory.☆66Updated last year
- Blueteam operational triage registry hunting/forensic tool.☆147Updated 2 years ago
- Rules Shared by the Community from 100 Days of YARA 2023☆76Updated 2 years ago
- S2AN - Mapper of Sigma/Suricata Rules/Signatures ➡️ MITRE ATT&CK Navigator☆86Updated 2 years ago
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆51Updated 4 months ago
- Library of threat hunts to get any user started!☆44Updated 4 years ago
- My Jupyter Notebooks☆36Updated 2 months ago
- The core backend server handling API requests and task management☆39Updated last week
- Automatic detection engineering technical state compliance☆55Updated 10 months ago
- Sigma detection rules for hunting with the threathunting-keywords project☆55Updated 3 months ago
- CSIRT Jump Bag☆26Updated last year
- A home for detection content developed by the delivr.to team☆69Updated this week
- This directory contains presentations and related materials of my speaking engagements. I also use this to record historical presentation…☆17Updated 3 months ago
- BSidesRoc 2022 Linux Malware/Forensics Course☆76Updated 3 years ago
- labs_modern_malware_c2 Originally supporting Defcon workshop, will morph into Attack Defend for C2.☆19Updated 2 years ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆105Updated 3 years ago
- Import specific data sources into the Sigma generic and open signature format.☆78Updated 3 years ago