nsacyber / Chinese-State-Sponsored-Cyber-Operations-Observed-TTPsLinks
Supporting files for the Chinese State-Sponsored Cyber Operations: Observed TTPs Cybersecurity Advisory. #nsacyber
☆44Updated 4 years ago
Alternatives and similar repositories for Chinese-State-Sponsored-Cyber-Operations-Observed-TTPs
Users that are interested in Chinese-State-Sponsored-Cyber-Operations-Observed-TTPs are comparing it to the libraries listed below
Sorting:
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆100Updated last year
- A CALDERA plugin☆25Updated 3 months ago
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆86Updated 3 years ago
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆73Updated 2 years ago
- ☆11Updated 4 years ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆114Updated 3 years ago
- Python client for Assemblyline 3 and 4 / Client python pour AssemblyLine 3 and 4☆23Updated 2 weeks ago
- SANS Slingshot Linux Distribution☆53Updated 4 years ago
- This project can be used to create AMIs based on Kali Linux, a penetration testing distribution.☆21Updated last week
- Defence Against the Dark Arts☆34Updated 5 years ago
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆116Updated last year
- Virtual machines that are set up with a variety of known vulnerabilities.☆15Updated 3 years ago
- Accelerating the collection, processing, analysis and outputting of digital forensic artefacts.☆31Updated 7 months ago
- A sample VHDX file with multiple verbose examples of forensic and anti-forensics artifacts. Meant to be basic and can be expanded upon. P…☆27Updated 2 years ago
- A MITRE ATT&CK Lookup Tool☆45Updated last year
- The Atomic Playbook contains TTPs from the MITRE ATT&CK framework mapped to the tests in the Atomic Red Team. It serves as a single resou…☆33Updated 2 months ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆65Updated 3 years ago
- ☆12Updated 2 years ago
- ☆14Updated 5 years ago
- Simple PowerShell script to enable process scanning with Yara.☆97Updated 2 years ago
- Indicators of Compromise for malware documented in whitepapers.☆27Updated 5 months ago
- BlackBerry Threat Research & Intelligence☆98Updated last year
- Logs key Windows process performance metrics. #nsacyber☆68Updated 2 years ago
- ☆96Updated 3 months ago
- Search a filesystem for indicators of compromise (IoC).☆80Updated 3 weeks ago
- Python API for interacting with sigma rules.☆54Updated 3 years ago
- A CALDERA plugin☆26Updated last year
- A GUI to query the API of abuse.ch.☆70Updated 3 years ago
- ☆80Updated 2 years ago
- Import CrowdStrike Threat Intelligence into your instance of MISP☆48Updated 2 months ago