Some extracted Features\IoCs\Artifacts\Patterns from APT Malware
☆14Mar 4, 2020Updated 6 years ago
Alternatives and similar repositories for APT-Malware-Reports-Set-1
Users that are interested in APT-Malware-Reports-Set-1 are comparing it to the libraries listed below
Sorting:
- ☆14Dec 28, 2020Updated 5 years ago
- Recent cyber attacks reports & interesting analysis files☆15Apr 14, 2022Updated 3 years ago
- Collection of exploits that were verified by an automated system☆13Jun 17, 2021Updated 4 years ago
- 🧬 Mitre Interactive Network Graph (APTs, Malware, Tools, Techniques & Tactics)☆103Apr 26, 2022Updated 3 years ago
- A collection of attacks metadata that were used in my previous pen-test tools☆17Dec 23, 2022Updated 3 years ago
- ELKFH - Elastic, Logstash, Kibana, Filebeat and Honeypot (HTTP, HTTPS, SSH, RDP, VNC, Redis, MySQL, MONGO, SMB, LDAP)☆47Apr 26, 2021Updated 4 years ago
- Pure Honeypots with an automated bash script☆21Sep 9, 2021Updated 4 years ago
- QUICk - a go library based on gopacket for analyzing QUIC CHLO messages☆22Jun 13, 2020Updated 5 years ago
- ☆25Jun 25, 2021Updated 4 years ago
- Agile Sandbox for analyzing Windows, Linux and macOS malware and execution behaviors☆73Nov 12, 2023Updated 2 years ago
- STIX 2.1 Visualizer, Attack and Activity Thread Graph for Threat Modeling☆33Dec 9, 2024Updated last year
- Malware Analysis, Threat Intelligence and Reverse Engineering: LABS☆82Dec 24, 2020Updated 5 years ago
- DNS tunneling over DoH Dataset☆11Mar 9, 2023Updated 3 years ago
- Automated OpenBSD configuration☆11Jul 26, 2025Updated 7 months ago
- Azure-Sentinel-BYOML☆12Nov 8, 2019Updated 6 years ago
- ☆13Aug 19, 2015Updated 10 years ago
- How to bypass your Bell Aliant provided modems.☆13Feb 2, 2026Updated last month
- golang package to provide lightweight internal pub/sub for goroutines☆29Jan 23, 2014Updated 12 years ago
- ☆11Jan 16, 2018Updated 8 years ago
- This is useful if you are running an investigation to determine the usage of the same username on different social networks.☆12Dec 10, 2020Updated 5 years ago
- SocialNetSpy© is an information gathering tool based on Python. It obtains all the social network profiles and general informations of a …☆10Oct 14, 2022Updated 3 years ago
- Solutions for various crackmes☆20Jan 13, 2013Updated 13 years ago
- Python based Web Scraper which can discover JavaScript files and parse them for juicy information (API keys, IP's, Hidden Paths etc)☆16Feb 17, 2022Updated 4 years ago
- ☆12Jan 5, 2021Updated 5 years ago
- 微软7月布丁增加内存延迟释放机制☆11Jul 19, 2014Updated 11 years ago
- A book about how to conduct digital forensic investigations with free and open source tools.☆11Apr 30, 2014Updated 11 years ago
- It's an experiment based on 09 KDD paper, Beyond Blacklists: Learning to Detect Malicious Web Sites from Suspicious URLs☆10Jan 8, 2019Updated 7 years ago
- 💉 Core Services that make up the Antidote Platform☆15Dec 3, 2021Updated 4 years ago
- VulnWhisperer Stack (ELK + VulnWhisperer + OpenVAS + Nessus)☆13Aug 14, 2018Updated 7 years ago
- A script to analyze geographic GSuite Login activity☆10Sep 3, 2017Updated 8 years ago
- IBM Db2 for z/OS Developer Extension for VS Code☆15Dec 3, 2025Updated 3 months ago
- Modeling, analyzing and rendering attack trees.☆11Sep 9, 2021Updated 4 years ago
- ☆12Feb 9, 2025Updated last year
- ☆12Sep 12, 2020Updated 5 years ago
- Support for AtariBASIC, 6502 Assembler, and bAtariBASIC in Sublime Text.☆10Updated this week
- An in-memory point-in-polygon (reverse geocoding) package for Who's On First data☆10Sep 28, 2017Updated 8 years ago
- Template for a docker image pipeline using IaC with Cloudformation.☆12Feb 1, 2022Updated 4 years ago
- Package lmdb-go provides Go bindings and an idiomatic wrapper for the Symas's LMDB database library.☆10Sep 18, 2016Updated 9 years ago
- RepoToStoreBugBountyInfo☆11Mar 11, 2020Updated 5 years ago