nsacyber / Chinese-State-Sponsored-Cyber-Operations-Observed-TTPs
Supporting files for the Chinese State-Sponsored Cyber Operations: Observed TTPs Cybersecurity Advisory. #nsacyber
☆43Updated 3 years ago
Alternatives and similar repositories for Chinese-State-Sponsored-Cyber-Operations-Observed-TTPs:
Users that are interested in Chinese-State-Sponsored-Cyber-Operations-Observed-TTPs are comparing it to the libraries listed below
- ☆28Updated 3 months ago
- Caldera plugin to deploy "humans" to emulate user behavior on systems☆27Updated 11 months ago
- Practical Information Sharing between Law Enforcement and CSIRT communities using MISP☆32Updated last year
- A sample VHDX file with multiple verbose examples of forensic and anti-forensics artifacts. Meant to be basic and can be expanded upon. P…☆26Updated 2 years ago
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆114Updated last year
- This project can be used to create AMIs based on Kali Linux, a penetration testing distribution.☆21Updated 2 weeks ago
- A CALDERA plugin☆26Updated 8 months ago
- Search a filesystem for indicators of compromise (IoC).☆71Updated 2 months ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆114Updated 3 years ago
- Supporting files for cyber challenge exercises. #nsacyber☆45Updated 6 years ago
- Accelerating the collection, processing, analysis and outputting of digital forensic artefacts.☆31Updated 2 months ago
- ☆19Updated 2 years ago
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆86Updated 2 years ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆63Updated 2 years ago
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆70Updated last year
- Detects Windows and Linux systems with enabled Trusted Platform Modules (TPM) vulnerable to CVE-2017-15361. #nsacyber☆55Updated 6 years ago
- Open YARA scan- and search engine☆22Updated 2 months ago
- A collection of Sigma rules organized by MITRE ATT&CK technique☆17Updated 3 years ago
- This CALDERA Plugin converts Adversary Emulation Plans from the Center for Threat Informed Defense☆30Updated last month
- Passive OS detection based on SYN packets without Transmitting any Data☆46Updated 2 years ago
- Digital Forensics Artifacts Knowledge Base☆81Updated 11 months ago
- Public repository for Red Canary Research☆37Updated 4 years ago
- Logs key Windows process performance metrics. #nsacyber☆66Updated 2 years ago
- ATT&CK Powered Suit is a browser extension that puts the complete MITRE ATT&CK® knowledge base at your fingertips with text search, conte…☆77Updated 5 months ago
- Cont3xt intends to centralize and simplify a structured approach to gathering contextual intelligence in support of technical investigati…☆37Updated last year
- ☆22Updated last week
- Repository of all the sites related to infosec IP/Domain/Hash/SSL/etc OSINT and eventually will include more.☆66Updated last year
- ☆12Updated 2 years ago
- Sp00fer blog post -☆26Updated 2 years ago
- A home for detection content developed by the delivr.to team☆68Updated 2 months ago