A repository of open source reports on different malware families used in targeted cyber intrusions ("APT").
☆55Jun 27, 2015Updated 10 years ago
Alternatives and similar repositories for APTMalwareNotes
Users that are interested in APTMalwareNotes are comparing it to the libraries listed below
Sorting:
- inject shellcode into remote process via message hook☆15Oct 28, 2020Updated 5 years ago
- Extract information from MISP via the API☆16Jul 18, 2016Updated 9 years ago
- My scripts to deobfuscate APT32 malware☆27Apr 17, 2022Updated 3 years ago
- A streamlined way to create STIX documents!☆31Apr 30, 2014Updated 11 years ago
- ☆37Dec 10, 2018Updated 7 years ago
- Malicious PDF document parsing tool☆16Nov 1, 2017Updated 8 years ago
- ASLR bypass in Chrome version 77☆24Oct 28, 2019Updated 6 years ago
- A warehouse for your malware☆136Nov 21, 2025Updated 3 months ago
- A set of Maltego transforms for VirusTotal Public API v2.0. This set has the added functionality of caching queries on a daily basis to s…☆82Nov 29, 2015Updated 10 years ago
- A collection of my reverse engineering and malware analysis write-ups☆21Dec 11, 2020Updated 5 years ago
- Ransomware Detection Test PowerShell Script☆11Sep 22, 2017Updated 8 years ago
- The ContactDB project was initiated to cover the need for a tool to maintain contacts for CSIRT teams☆37Jan 21, 2022Updated 4 years ago
- Public Maltego Transforms☆24May 24, 2017Updated 8 years ago
- DKMC - Dont kill my cat - Malicious payload evasion tool☆22Sep 7, 2017Updated 8 years ago
- ☆14Dec 5, 2014Updated 11 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 6 years ago
- OSCP Prep notes☆14Oct 18, 2020Updated 5 years ago
- A book about how to conduct digital forensic investigations with free and open source tools.☆11Apr 30, 2014Updated 11 years ago
- Security R package with a set of utils to analyse the different industry standards (MITRE and NIST).☆12May 27, 2019Updated 6 years ago
- Proof of concept implementation of a cyber threat intelligence and incident handling platform☆11Feb 10, 2023Updated 3 years ago
- Malware WinXPSP2.Cermalus Windows Kernel Virus☆14Aug 11, 2023Updated 2 years ago
- Use to perform Microsoft exchange account brute-force.☆73Apr 17, 2021Updated 4 years ago
- Python module to interact with THOR Thunderstorm service☆17Dec 5, 2025Updated 2 months ago
- Synapse Rapid Power-up for SinkDB☆11Jun 24, 2025Updated 8 months ago
- The repository contains IOCs in CSV format for APT, Cyber Crimes, Malware and Trojan and whatever I found as part of hunting and research☆12Jun 10, 2017Updated 8 years ago
- DO NOT RUN THIS.☆47Oct 20, 2021Updated 4 years ago
- ARCHIVED ce1sus, a threat information database ARCHIVED☆28Dec 8, 2015Updated 10 years ago
- APTnotes data☆1,773Dec 16, 2024Updated last year
- IOC Management and Visualization Tool☆48Dec 8, 2022Updated 3 years ago
- Use powershell to test Office-based persistence methods☆76Apr 17, 2021Updated 4 years ago
- Plugins for the Viper Framework☆14Sep 21, 2019Updated 6 years ago
- Steezy - Ghetto Yara Generation☆15Mar 27, 2023Updated 2 years ago
- 一些漏洞的环境/利用工具/分析☆10Jul 24, 2020Updated 5 years ago
- Malice Office/OLE/RTF Plugin☆13Aug 29, 2018Updated 7 years ago
- plugin of ida with pin☆48Jan 25, 2021Updated 5 years ago
- Simple C implementation to perform shellcode process injection via win32 APIs☆63Jan 2, 2020Updated 6 years ago
- A framework for receiving and redistributing abuse feeds☆125Sep 27, 2019Updated 6 years ago
- APT Malware Dataset Containing over 3,500 State-Sponsored Malware Samples☆361Nov 10, 2022Updated 3 years ago
- Slow llvm tracing for the masses☆14Feb 22, 2020Updated 6 years ago