Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research
☆53Mar 16, 2018Updated 7 years ago
Alternatives and similar repositories for Royal_APT
Users that are interested in Royal_APT are comparing it to the libraries listed below
Sorting:
- Various scrips☆12Oct 19, 2022Updated 3 years ago
- IoC's, PCRE's, YARA's etc☆23Mar 25, 2025Updated 11 months ago
- Enables dynamic translation of structured data between formats☆14Dec 14, 2018Updated 7 years ago
- Python-based cloud node for local use☆11Mar 7, 2018Updated 7 years ago
- Plugins written for CVE-Search☆27Apr 16, 2021Updated 4 years ago
- Virustotal Data to Timesketch☆16Feb 28, 2019Updated 7 years ago
- Kernel Stack info leak at exportObjectToClient function☆42May 21, 2019Updated 6 years ago
- The great TCP Gender Changer (tgcd) tool compiled for Windows☆14Apr 18, 2016Updated 9 years ago
- ☆18Dec 4, 2018Updated 7 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 11 years ago
- A tool to generate yara signatures from function blocks☆19Dec 8, 2014Updated 11 years ago
- Create Suricata and Snort DNS signatures given a single domain or list of domains in a file.☆18Nov 13, 2017Updated 8 years ago
- VirusTotal Intelligence Notification Puller☆28Jun 29, 2016Updated 9 years ago
- CVE-2019-12949☆26Jun 28, 2019Updated 6 years ago
- Automation for VirusTotal☆31May 6, 2016Updated 9 years ago
- Codex Gigas malware DNA profiling search engine discovers malware patterns and characteristics assisting individuals who are attracted in…☆156Dec 20, 2019Updated 6 years ago
- SQL scripts for querying event logs☆21Jul 12, 2017Updated 8 years ago
- ☆21Apr 19, 2024Updated last year
- ☆16Mar 10, 2017Updated 8 years ago
- PoC ActiveX SVG Document Execution☆21Nov 8, 2018Updated 7 years ago
- NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements☆95Sep 19, 2017Updated 8 years ago
- Supporting Files on my analysis of the malware designated hdroot.☆59Feb 23, 2017Updated 9 years ago
- OLE Package Format Documentation☆23Jun 13, 2020Updated 5 years ago
- A python script that can be used to scan data within in an IDB using Yara.☆23Sep 4, 2018Updated 7 years ago
- Proof of concept showing how to exploit the CVE-2018-11759☆40Dec 11, 2018Updated 7 years ago
- A collection of anti disassembly techniques☆20Jul 22, 2017Updated 8 years ago
- Putting the Sauce in CyberChef - making CyberChef automatable☆19Feb 18, 2026Updated 2 weeks ago
- A simple script for exploit RCE for Struts 2 S2-053(CVE-2017-12611)☆37Sep 8, 2017Updated 8 years ago
- Generate bulk YARA rules from YAML input☆22Feb 3, 2020Updated 6 years ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- A collection of tools to enumerate and analyse Windows DACLs☆109Jul 11, 2015Updated 10 years ago
- A pytest module for The Interactive Disassembler and IDAPython; Record and Replay IDAPython API, execute inside IDA or use mockups of IDA…☆47Nov 3, 2018Updated 7 years ago
- Yara rules☆49Jan 28, 2014Updated 12 years ago
- Work Fast With the pattern matching swiss knife for malware researchers.☆38Mar 26, 2016Updated 9 years ago
- Extract GUIDs from .NET assemblies☆21Jun 15, 2016Updated 9 years ago
- A python library for building and using hash databases.☆22Feb 8, 2023Updated 3 years ago
- Materials from presentation☆20Jan 18, 2016Updated 10 years ago
- This repository is a curated list of pro bono incident response entities.☆21Jun 21, 2023Updated 2 years ago
- Lazy Office Analyzer☆121Feb 15, 2017Updated 9 years ago