qeeqbox / APT-Malware-Reports-Set-1Links
Some extracted Features\IoCs\Artifacts\Patterns from APT Malware
☆14Updated 5 years ago
Alternatives and similar repositories for APT-Malware-Reports-Set-1
Users that are interested in APT-Malware-Reports-Set-1 are comparing it to the libraries listed below
Sorting:
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆103Updated 4 months ago
- Easy way to create a MISP event related to a Phishing page☆17Updated 2 years ago
- Fang and defang indicators of compromise. You can test this project in a GUI here: http://ioc-fanger.hightower.space .☆65Updated 2 years ago
- Tools to interact with APTnotes reporting/index.☆106Updated 5 years ago
- Collection of YARA signatures from individual research☆46Updated last year
- A map displaying threat actors from the misp-galaxy☆33Updated 2 years ago
- Repository of all the sites related to infosec IP/Domain/Hash/SSL/etc OSINT and eventually will include more.☆68Updated 2 weeks ago
- A web-based tool to assist the work of the intuitive threat analysts.☆113Updated 6 years ago
- Graph Representation of MITRE ATT&CK's CTI data☆49Updated 6 years ago
- MISP website (hugo-based)☆25Updated 2 weeks ago
- Utility for parsing Bro log files into CSV or JSON format☆41Updated 2 years ago
- Definition, description and relationship types of MISP objects☆103Updated 2 weeks ago
- This script scans the files extracted by Zeek with YARA rules located on the rules folder on a Linux based Zeek sensor, if there is a mat…☆62Updated last year
- A mapping of used malware names to commonly known family names☆62Updated 2 years ago
- A tool to assess data quality, built on top of the awesome OSSEM.☆79Updated 3 years ago
- Personal compilation of APT malware from whitepaper releases, documents and own research☆265Updated 6 years ago
- The Fastest way to consume Threat Intel☆26Updated 3 years ago
- ☆35Updated 4 years ago
- Website crawler with YARA detection☆90Updated 2 years ago
- An extendable tool to extract and aggregate IoCs from threat feeds☆34Updated last year
- Home to the ActorTrackr source code☆29Updated 8 years ago
- YAFRA is a semi-automated framework for analyzing and representing reports about IT Security incidents.☆27Updated 3 years ago
- A Modular MWDB Utility to Collect Fresh Malware Samples☆34Updated 4 years ago
- A Python malware analysis library.☆50Updated 2 years ago
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆37Updated 3 years ago
- Check IOC provided by a MISP instance on Suricata events☆18Updated 6 years ago
- ☆25Updated 3 years ago
- A collection of Indicators of Compromise (IoCs), most aligning with samples derived from the signatures in the YARA-Signatures repo☆30Updated 5 years ago
- Client API to query any Passive DNS implementation following the Passive DNS - Common Output Format.☆82Updated 8 months ago
- Dovehawk is a Zeek module that automatically imports MISP indicators and reports Sightings☆122Updated 4 years ago