Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research
☆53Mar 16, 2018Updated 8 years ago
Alternatives and similar repositories for Royal_APT
Users that are interested in Royal_APT are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Various scrips☆12Oct 19, 2022Updated 3 years ago
- Python-based cloud node for local use☆11Mar 7, 2018Updated 8 years ago
- Server for receiving autorun data from the clients☆13Sep 26, 2017Updated 8 years ago
- IoC's, PCRE's, YARA's etc☆23Mar 25, 2025Updated last year
- Finds dynamic DNS (like no-ip.org) domains from a given list of domains☆14Sep 17, 2015Updated 10 years ago
- Automation for VirusTotal☆31May 6, 2016Updated 9 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 11 years ago
- A tool to generate yara signatures from function blocks☆19Dec 8, 2014Updated 11 years ago
- Plugins written for CVE-Search☆27Apr 16, 2021Updated 4 years ago
- Simple Distributed IOC Scanner☆12Jul 27, 2015Updated 10 years ago
- A python script that can be used to scan data within in an IDB using Yara.☆23Sep 4, 2018Updated 7 years ago
- Enables dynamic translation of structured data between formats☆14Dec 14, 2018Updated 7 years ago
- OLE Package Format Documentation☆23Jun 13, 2020Updated 5 years ago
- Putting the Sauce in CyberChef - making CyberChef automatable☆19Feb 18, 2026Updated last month
- VirusTotal Intelligence Notification Puller☆28Jun 29, 2016Updated 9 years ago
- SQL scripts for querying event logs☆21Jul 12, 2017Updated 8 years ago
- Generate bulk YARA rules from YAML input☆22Feb 3, 2020Updated 6 years ago
- PoC ActiveX SVG Document Execution☆21Nov 8, 2018Updated 7 years ago
- ☆16Mar 10, 2017Updated 9 years ago
- ☆52Sep 17, 2018Updated 7 years ago
- Artefacts from various retefe campaigns☆10Mar 9, 2019Updated 7 years ago
- Virustotal Data to Timesketch☆16Feb 28, 2019Updated 7 years ago
- PoC of Remote Command Execution via Log injection on SAP NetWeaver AS JAVA CRM☆52Mar 14, 2018Updated 8 years ago
- NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements☆95Sep 19, 2017Updated 8 years ago
- Registry to JSON. This Project is for learning purposes and is not maintained.☆12Dec 28, 2021Updated 4 years ago
- ☆21Apr 19, 2024Updated last year
- ☆18Dec 4, 2018Updated 7 years ago
- The great TCP Gender Changer (tgcd) tool compiled for Windows☆14Apr 18, 2016Updated 9 years ago
- A pytest module for The Interactive Disassembler and IDAPython; Record and Replay IDAPython API, execute inside IDA or use mockups of IDA…☆47Nov 3, 2018Updated 7 years ago
- Malware visualization on earth map☆41Jan 26, 2015Updated 11 years ago
- A collection of tools to enumerate and analyse Windows DACLs☆109Jul 11, 2015Updated 10 years ago
- A python library for building and using hash databases.☆22Mar 3, 2026Updated 3 weeks ago
- Community modules for FAME☆65Dec 16, 2025Updated 3 months ago
- Kernel Stack info leak at exportObjectToClient function☆42May 21, 2019Updated 6 years ago
- ☆46Jun 14, 2018Updated 7 years ago
- PowerShell interpreter for unmanaged (non CLI) C++ projects☆16Jul 19, 2017Updated 8 years ago
- Yara rules for detecting malware☆23Sep 9, 2025Updated 6 months ago
- some classes which can help me to program kernel driver in Windows.☆16Feb 9, 2018Updated 8 years ago
- NMAP NSE that enumerates VNC authentication types☆17Dec 21, 2010Updated 15 years ago