nccgroup / Royal_APT
Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research
☆53Updated 7 years ago
Alternatives and similar repositories for Royal_APT:
Users that are interested in Royal_APT are comparing it to the libraries listed below
- IoC's, PCRE's, YARA's etc☆23Updated 2 weeks ago
- Various snippets created during malware analysis☆22Updated 6 years ago
- Handy scripts to speed up malware analysis☆35Updated last year
- ☆23Updated 9 years ago
- Crack your macros like the math pros.☆33Updated 8 years ago
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆43Updated 6 years ago
- Presentation materials for talks I've given.☆20Updated 5 years ago
- Maltego transforms to pivot between PE files based on their VirusTotal codeblocks☆18Updated 3 years ago
- A Maltego transform for VirusTotal Submitter Information☆33Updated 5 years ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Updated 5 years ago
- Trace ScriptBlock execution for powershell v2☆40Updated 5 years ago
- A Windows REG file to enable all default PowerShell logging on a system with PowerShell v5 installed☆16Updated 8 years ago
- a modified version base on Tracecorn☆20Updated 5 years ago
- ☆43Updated 6 years ago
- API functions for Malware Research☆35Updated 5 years ago
- TA505 unpacker Python 2.7☆47Updated 4 years ago
- ConventionEngine - A Yara Rulepack for PDB Path Hunting☆38Updated 2 years ago
- ActiveMime File Format Documentation☆17Updated 3 years ago
- Telsy CTI Research Team☆57Updated 4 years ago
- ☆15Updated 4 years ago
- This script is used for extracting DDE in docx and xlsx☆12Updated 7 years ago
- hopefully a source-to-source deobfuscator, aiming at deobfuscating common scripts languages such as Powershell, VBA and Javascript. Curre…☆40Updated 5 years ago
- ☆27Updated 7 years ago
- Network detector for Winnti malware☆20Updated 7 years ago
- Yaras Random☆20Updated 6 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Updated 6 years ago
- POSHSPY backdoor code☆43Updated 8 years ago
- ☆23Updated 4 years ago
- Volatility Framework plugin to detect various types of hooks as performed by banking Trojans☆41Updated 6 years ago
- Malware samples observed in the wild from time to time☆12Updated 5 years ago