nsacyber / Chinese-State-Sponsored-Cyber-Operations-Observed-TTPs
Supporting files for the Chinese State-Sponsored Cyber Operations: Observed TTPs Cybersecurity Advisory. #nsacyber
☆43Updated 3 years ago
Alternatives and similar repositories for Chinese-State-Sponsored-Cyber-Operations-Observed-TTPs:
Users that are interested in Chinese-State-Sponsored-Cyber-Operations-Observed-TTPs are comparing it to the libraries listed below
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆70Updated last year
- This project can be used to create AMIs based on Kali Linux, a penetration testing distribution.☆19Updated this week
- Search a filesystem for indicators of compromise (IoC).☆70Updated last month
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆63Updated 2 years ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆113Updated 3 years ago
- SANS Slingshot Linux Distribution☆47Updated 4 years ago
- Logs key Windows process performance metrics. #nsacyber☆66Updated 2 years ago
- ☆11Updated 4 years ago
- ATT&CK Powered Suit is a browser extension that puts the complete MITRE ATT&CK® knowledge base at your fingertips with text search, conte…☆76Updated 4 months ago
- Supporting files for cyber challenge exercises. #nsacyber☆45Updated 6 years ago
- This script enhances endpoint logging telemetry for the purpose of advanced malware threat detection or for building detections or malwar…☆27Updated last month
- A collection of PowerShell modules for interacting with the Shodan API. Includes modules for returning information about the API, client …☆24Updated 7 months ago
- Open IOC sharing platform☆56Updated 4 months ago
- ☆18Updated 4 months ago
- Automatic detection engineering technical state compliance☆54Updated 8 months ago
- This repository contains the code and PCAPS used for the SANS webinar, "Hacking Proprietary Protocols" given on February 23, 2021.☆34Updated 2 years ago
- Caldera plugin to deploy "humans" to emulate user behavior on systems☆27Updated 10 months ago
- Detects Windows and Linux systems with enabled Trusted Platform Modules (TPM) vulnerable to CVE-2017-15361. #nsacyber☆55Updated 6 years ago
- pcaps for Wireshark tutorial about examining Dridex infection traffic☆16Updated 4 years ago
- ☆28Updated 2 months ago
- MITRE Shield website☆19Updated 3 years ago
- Track progress and keep notes while working through likethecoins' CTI Self Study Plan☆28Updated 2 years ago
- ☆26Updated 3 years ago
- DeTT&CT Editor☆12Updated 3 months ago
- Next Generation Phishing Tool For Internal / Red Teams☆35Updated 5 years ago
- Collection of walkthroughs on various threat hunting techniques☆75Updated 4 years ago
- Accelerating the collection, processing, analysis and outputting of digital forensic artefacts.☆31Updated last month
- Defensive Origins Training Schedule☆38Updated last year
- A GUI to query the API of abuse.ch.☆70Updated 2 years ago
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆111Updated last year