giorgioditizio / APTs-database
A repository with data about APTs
☆11Updated 2 years ago
Alternatives and similar repositories for APTs-database:
Users that are interested in APTs-database are comparing it to the libraries listed below
- Extensible framework for analyzing publicly available information about vulnerabilities☆110Updated 3 months ago
- Harvest Linux forensic data for operational triage of an event.☆51Updated 9 months ago
- Aggregated Indicators of Compromise collected and cross-verified from multiple open and community-supported sources, enriched and ranked …☆33Updated 7 months ago
- ☆65Updated 3 years ago
- BlackBerry Threat Research & Intelligence☆98Updated last year
- A free data collection and YARA scanning tool for cybersecurity incident investigation, compromise assessment and threat hunting☆14Updated 4 months ago
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆26Updated 2 weeks ago
- ☆45Updated last year
- Blueteam operational triage registry hunting/forensic tool.☆145Updated last year
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆26Updated last week
- Penguin OS Forensic (or Flight) Recorder☆40Updated 3 months ago
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆67Updated last week
- A home for detection content developed by the delivr.to team☆67Updated last month
- Automatic detection engineering technical state compliance☆55Updated 8 months ago
- Sensor Mappings to ATT&CK is a collection of resources to assist cyber defenders with understanding which sensors and events can help det…☆49Updated last week
- This directory contains presentations and related materials of my speaking engagements. I also use this to record historical presentation…☆15Updated last month
- A zero dependency and customizable Python library for scanning Windows and Linux process memory.☆66Updated last year
- ReWrite of AChoir in Go for Cross Platform☆39Updated last month
- This CALDERA Plugin converts Adversary Emulation Plans from the Center for Threat Informed Defense☆30Updated 2 weeks ago
- Baseline a Windows System against LOLBAS☆26Updated 11 months ago
- Forensics artifacts collection☆19Updated 3 years ago
- A CALDERA plugin☆26Updated 8 months ago
- A Jupyter notebook to assist with the analysis of the output generated from Volatility memory extraction framework.☆95Updated last year
- Sigma detection rules for hunting with the threathunting-keywords project☆55Updated 3 weeks ago
- Rules Shared by the Community from 100 Days of YARA 2023☆76Updated last year
- A toolkit for the post-mortem examination of Docker containers from forensic HDD copies☆98Updated last year
- A tool to modify timestamps in a packet capture to a user selected date☆31Updated 3 years ago
- ☆39Updated 2 years ago
- simple webapp for converting sigma rules into siem queries using the pySigma library☆47Updated last year
- A collection of tips for using MISP.☆74Updated 3 months ago