giorgioditizio / APTs-database
A repository with data about APTs
☆12Updated 2 years ago
Alternatives and similar repositories for APTs-database:
Users that are interested in APTs-database are comparing it to the libraries listed below
- Extensible framework for analyzing publicly available information about vulnerabilities☆112Updated 3 weeks ago
- Aggregated Indicators of Compromise collected and cross-verified from multiple open and community-supported sources, enriched and ranked …☆34Updated 8 months ago
- BlackBerry Threat Research & Intelligence☆98Updated last year
- ☆65Updated 3 years ago
- Harvest Linux forensic data for operational triage of an event.☆51Updated 10 months ago
- This directory contains presentations and related materials of my speaking engagements. I also use this to record historical presentation…☆16Updated 2 months ago
- Enterprise Response Model & Common Knowledge☆36Updated 10 months ago
- Sensor Mappings to ATT&CK is a collection of resources to assist cyber defenders with understanding which sensors and events can help det…☆49Updated last month
- A free data collection and YARA scanning tool for cybersecurity incident investigation, compromise assessment and threat hunting☆15Updated 5 months ago
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆26Updated this week
- Sigma detection rules for hunting with the threathunting-keywords project☆55Updated last month
- The core backend server handling API requests and task management☆38Updated 2 weeks ago
- Library of threat hunts to get any user started!☆44Updated 4 years ago
- MITRE Shield website☆19Updated 3 years ago
- This CALDERA Plugin converts Adversary Emulation Plans from the Center for Threat Informed Defense☆30Updated last month
- A Jupyter notebook to assist with the analysis of the output generated from Volatility memory extraction framework.☆95Updated last year
- A toolkit for the post-mortem examination of Docker containers from forensic HDD copies☆98Updated last year
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆67Updated last week
- Augmentation to Machine Readable CTI☆31Updated last month
- Blueteam operational triage registry hunting/forensic tool.☆145Updated last year
- Automatic detection engineering technical state compliance☆55Updated 9 months ago
- Remote access and Antivirus Logging Database☆42Updated 11 months ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆106Updated 2 years ago
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆40Updated last year
- A curated list of FOSS software appliances for building a SOC☆18Updated 4 years ago
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆55Updated 3 years ago
- A CALDERA plugin☆26Updated 8 months ago
- MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.☆63Updated last year
- A MITRE ATT&CK Lookup Tool☆45Updated 11 months ago
- Notes and IoCs of fresh malware☆57Updated 9 months ago