giorgioditizio / APTs-databaseView external linksLinks
A repository with data about APTs
☆13Nov 24, 2022Updated 3 years ago
Alternatives and similar repositories for APTs-database
Users that are interested in APTs-database are comparing it to the libraries listed below
Sorting:
- ☆25Jul 12, 2023Updated 2 years ago
- Augmentation to Machine Readable CTI☆37Sep 9, 2025Updated 5 months ago
- A block-based programming environment for Arduino.☆16Jan 12, 2026Updated last month
- Asset inventory of over 800 public bug bounty programs.☆12Jun 12, 2023Updated 2 years ago
- Modern Honey Network deployment with ansible☆12Jun 4, 2022Updated 3 years ago
- A python plugin integrated into Carla Simulator for emulate cyber-attack over the CAN-Bus (https://carla.org/)☆14Apr 26, 2021Updated 4 years ago
- The Tifinagh Hand-written Letters Dataset☆12Feb 17, 2024Updated last year
- Curated list of Moroccans publishing in the most prestigious AI conferences☆10Oct 14, 2024Updated last year
- Automatic estimation and now-casting of housing deficit using census data and satellite imagery☆12Dec 7, 2021Updated 4 years ago
- Burp Suite extension to encode an IP address focused to bypass application IP / domain blacklist.☆11Sep 22, 2023Updated 2 years ago
- ☆10Aug 27, 2022Updated 3 years ago
- ☆11Jun 15, 2022Updated 3 years ago
- ☆14Dec 2, 2021Updated 4 years ago
- Strace: history, usage examples, example syscall tracer implementation☆10Mar 24, 2020Updated 5 years ago
- ☆12Dec 12, 2022Updated 3 years ago
- Zeek script library for getting the effective TLD of a domain.☆14Apr 12, 2024Updated last year
- ☆11Mar 16, 2016Updated 9 years ago
- miscellaneous scripts and things...☆22May 12, 2016Updated 9 years ago
- ☆11Dec 17, 2018Updated 7 years ago
- A python steganography module to store messages or files protected with AES-256 encryption inside an image.☆10Jan 18, 2022Updated 4 years ago
- ☆10Dec 19, 2024Updated last year
- Yara rules I've written☆10Dec 9, 2015Updated 10 years ago
- ☆13Nov 24, 2021Updated 4 years ago
- Attack/Defense services for the CyberChallenge.IT 2024 National Competition @ Turin, Italy☆11Jul 18, 2024Updated last year
- Exploit ConnectWise ScreenConnect (bypass authentication)☆13Feb 21, 2024Updated last year
- Continuous functions formalized in Lean4. A students project accompanied by a YouTube video.☆17Jul 10, 2025Updated 7 months ago
- ☆13Aug 11, 2018Updated 7 years ago
- Source code for AdaCare: Explainable Clinical Health Status Representation Learning via Scale-Adaptive Feature Extraction and Recalibrati…☆10Dec 12, 2020Updated 5 years ago
- Data-flow Analysis Visualizer☆10Dec 9, 2021Updated 4 years ago
- Extract Procedural Details of the TTP based on the actor mentioned in OSINT reportings☆13Feb 25, 2024Updated last year
- An open-source software based testing framework for automotive cybersecurity☆12Jul 14, 2023Updated 2 years ago
- Run virtual machines in docker using qemu and practice exploitation techniques overcoming containers limitations.☆14Jan 14, 2021Updated 5 years ago
- ☆13Sep 15, 2024Updated last year
- Source code and data about our large scale study about Java annotaion in practice☆12Apr 14, 2023Updated 2 years ago
- Extensions for Zeek's Intelligence Framework.☆11Mar 1, 2022Updated 3 years ago
- Tool for obtaining information about PPL processes☆16Feb 12, 2024Updated 2 years ago
- Welcome to Autoaudit, a log tampering detection tool.☆13Mar 19, 2024Updated last year
- The Tangled Genealogy of IoT Malware☆12Jan 5, 2021Updated 5 years ago
- Turn a supported list of filetypes (e.g. .docx) into a markdown structured text file. Also optionally defangs indicators and extract text…☆12Feb 5, 2026Updated last week