qeeqbox / APT-Malware-Reports-Set-1View external linksLinks
Some extracted Features\IoCs\Artifacts\Patterns from APT Malware
☆14Mar 4, 2020Updated 5 years ago
Alternatives and similar repositories for APT-Malware-Reports-Set-1
Users that are interested in APT-Malware-Reports-Set-1 are comparing it to the libraries listed below
Sorting:
- ☆14Dec 28, 2020Updated 5 years ago
- Recent cyber attacks reports & interesting analysis files☆15Apr 14, 2022Updated 3 years ago
- Collection of exploits that were verified by an automated system☆13Jun 17, 2021Updated 4 years ago
- 🧬 Mitre Interactive Network Graph (APTs, Malware, Tools, Techniques & Tactics)☆103Apr 26, 2022Updated 3 years ago
- A collection of attacks metadata that were used in my previous pen-test tools☆17Dec 23, 2022Updated 3 years ago
- ELKFH - Elastic, Logstash, Kibana, Filebeat and Honeypot (HTTP, HTTPS, SSH, RDP, VNC, Redis, MySQL, MONGO, SMB, LDAP)☆47Apr 26, 2021Updated 4 years ago
- Pure Honeypots with an automated bash script☆21Sep 9, 2021Updated 4 years ago
- QUICk - a go library based on gopacket for analyzing QUIC CHLO messages☆22Jun 13, 2020Updated 5 years ago
- ☆25Jun 25, 2021Updated 4 years ago
- Agile Sandbox for analyzing Windows, Linux and macOS malware and execution behaviors☆73Nov 12, 2023Updated 2 years ago
- STIX 2.1 Visualizer, Attack and Activity Thread Graph for Threat Modeling☆33Dec 9, 2024Updated last year
- How to bypass your Bell Aliant provided modems.☆12Feb 2, 2026Updated last week
- Malware Analysis, Threat Intelligence and Reverse Engineering: LABS☆82Dec 24, 2020Updated 5 years ago
- Azure-Sentinel-BYOML☆12Nov 8, 2019Updated 6 years ago
- DNS tunneling over DoH Dataset☆11Mar 9, 2023Updated 2 years ago
- golang package to provide lightweight internal pub/sub for goroutines☆29Jan 23, 2014Updated 12 years ago
- ☆13Aug 19, 2015Updated 10 years ago
- Automated OpenBSD configuration☆11Jul 26, 2025Updated 6 months ago
- RepoToStoreBugBountyInfo☆11Mar 11, 2020Updated 5 years ago
- Solutions for various crackmes☆20Jan 13, 2013Updated 13 years ago
- ☆12Feb 9, 2025Updated last year
- A book about how to conduct digital forensic investigations with free and open source tools.☆11Apr 30, 2014Updated 11 years ago
- An in-memory point-in-polygon (reverse geocoding) package for Who's On First data☆10Sep 28, 2017Updated 8 years ago
- ☆11Jan 5, 2021Updated 5 years ago
- Template for a docker image pipeline using IaC with Cloudformation.☆12Feb 1, 2022Updated 4 years ago
- SocialNetSpy© is an information gathering tool based on Python. It obtains all the social network profiles and general informations of a …☆10Oct 14, 2022Updated 3 years ago
- A TypeScript Framework for non-spa pages☆11Jan 21, 2026Updated 3 weeks ago
- jQuery-based Json to html pretty printer☆26Jun 15, 2012Updated 13 years ago
- Generates a detailed CSV file containing Sigma Rules statistics for each service or category, and each level, offering a holistic view of…☆10Dec 22, 2023Updated 2 years ago
- 💉 Core Services that make up the Antidote Platform☆15Dec 3, 2021Updated 4 years ago
- A script to analyze geographic GSuite Login activity☆10Sep 3, 2017Updated 8 years ago
- Maintain Windows Persistence with an evil Netshell Helper DLL☆12Jul 28, 2018Updated 7 years ago
- Package lmdb-go provides Go bindings and an idiomatic wrapper for the Symas's LMDB database library.☆10Sep 18, 2016Updated 9 years ago
- Implementation of second factor authentication with FIDO U2F tokens in a flask application☆11Jan 21, 2023Updated 3 years ago
- SSDT_process_hide_protect☆10Jul 17, 2014Updated 11 years ago
- IBM Db2 for z/OS Developer Extension for VS Code☆15Dec 3, 2025Updated 2 months ago
- It's an experiment based on 09 KDD paper, Beyond Blacklists: Learning to Detect Malicious Web Sites from Suspicious URLs☆10Jan 8, 2019Updated 7 years ago
- ☆11Jan 16, 2018Updated 8 years ago
- CVE-2015-2231 POC☆10Sep 8, 2015Updated 10 years ago