nsacyber / Chinese-State-Sponsored-Cyber-Operations-Observed-TTPsLinks
Supporting files for the Chinese State-Sponsored Cyber Operations: Observed TTPs Cybersecurity Advisory. #nsacyber
☆44Updated 3 years ago
Alternatives and similar repositories for Chinese-State-Sponsored-Cyber-Operations-Observed-TTPs
Users that are interested in Chinese-State-Sponsored-Cyber-Operations-Observed-TTPs are comparing it to the libraries listed below
Sorting:
- ☆11Updated 4 years ago
- A CALDERA plugin☆26Updated 11 months ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆114Updated 3 years ago
- A MITRE ATT&CK Lookup Tool☆45Updated last year
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆86Updated 3 years ago
- Caldera plugin to deploy "humans" to emulate user behavior on systems☆28Updated last year
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆64Updated 2 years ago
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆115Updated last year
- ☆29Updated 6 months ago
- Practical Information Sharing between Law Enforcement and CSIRT communities using MISP☆33Updated last year
- ATT&CK Powered Suit is a browser extension that puts the complete MITRE ATT&CK® knowledge base at your fingertips with text search, conte…☆78Updated last month
- A sample VHDX file with multiple verbose examples of forensic and anti-forensics artifacts. Meant to be basic and can be expanded upon. P…☆27Updated 2 years ago
- Defence Against the Dark Arts☆34Updated 5 years ago
- Columbo is a computer forensic analysis tool used to simplify and identify specific patterns in compromised datasets.☆61Updated 3 years ago
- THOR APT Scanner User Manual☆18Updated last week
- pcaps for Wireshark tutorial about examining Dridex infection traffic☆17Updated 4 years ago
- DNS Dashboard for hunting and identifying beaconing☆16Updated 4 years ago
- Open YARA scan- and search engine☆24Updated 4 months ago
- ☆12Updated 2 years ago
- URL fingerprinting made easy☆87Updated last year
- ☆96Updated 2 months ago
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆98Updated 11 months ago
- Sightings Ecosystem gives cyber defenders visibility into what adversaries actually do in the wild. With your help, we are tracking MITRE…☆35Updated last month
- Documentation site for Velociraptor☆48Updated this week
- Generate portable TTP intelligence from a web-based report☆31Updated 2 years ago
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆70Updated 2 years ago
- A windows hardening script that makes it difficult to compromise a Windows device. Only for use during Blue-Team Competitions.☆28Updated 11 months ago
- Digital Forensics Artifacts Knowledge Base☆83Updated last year
- Threat Hunter's Knowledge Base☆22Updated 3 years ago
- These are some of the commands which I use frequently during Malware Analysis and DFIR.☆24Updated last year