nsacyber / Chinese-State-Sponsored-Cyber-Operations-Observed-TTPs
Supporting files for the Chinese State-Sponsored Cyber Operations: Observed TTPs Cybersecurity Advisory. #nsacyber
☆42Updated 3 years ago
Alternatives and similar repositories for Chinese-State-Sponsored-Cyber-Operations-Observed-TTPs:
Users that are interested in Chinese-State-Sponsored-Cyber-Operations-Observed-TTPs are comparing it to the libraries listed below
- SANS Slingshot Linux Distribution☆45Updated 4 years ago
- A CALDERA plugin☆25Updated 5 months ago
- ☆12Updated 2 years ago
- ☆11Updated 4 years ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆109Updated 3 years ago
- ☆49Updated last year
- Accelerating the collection, processing, analysis and outputting of digital forensic artefacts.☆32Updated last month
- The Atomic Playbook contains TTPs from the MITRE ATT&CK framework mapped to the tests in the Atomic Red Team. It serves as a single resou…☆32Updated last year
- Cont3xt intends to centralize and simplify a structured approach to gathering contextual intelligence in support of technical investigati…☆36Updated 10 months ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆25Updated last year
- This CALDERA Plugin converts Adversary Emulation Plans from the Center for Threat Informed Defense☆29Updated 11 months ago
- A sample VHDX file with multiple verbose examples of forensic and anti-forensics artifacts. Meant to be basic and can be expanded upon. P…☆25Updated 2 years ago
- ☆26Updated 3 years ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆62Updated 2 years ago
- Caldera plugin to deploy "humans" to emulate user behavior on systems☆27Updated 8 months ago
- ☆27Updated last week
- ATT&CK Powered Suit is a browser extension that puts the complete MITRE ATT&CK® knowledge base at your fingertips with text search, conte…☆74Updated 2 months ago
- Practical Information Sharing between Law Enforcement and CSIRT communities using MISP☆31Updated last year
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆18Updated last year
- ☆21Updated last year
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆84Updated 2 years ago
- Guidance for blocking outdated web technologies. #nsacyber☆55Updated 3 years ago
- Automatic detection engineering technical state compliance☆53Updated 6 months ago
- Collection of IoCs available and related to attacks on ESXi infrastructures that occurred as of Friday February 3, 2023.☆12Updated last year
- pcaps for Wireshark tutorial about examining Dridex infection traffic☆16Updated 4 years ago
- Logs key Windows process performance metrics. #nsacyber☆66Updated 2 years ago
- MITRE Shield website☆18Updated 3 years ago
- Search a filesystem for indicators of compromise (IoC).☆69Updated 4 months ago
- Azure Deployment Templates for Mandiant Managed Huning☆11Updated last year
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆43Updated this week