Some extracted Features\IoCs\Artifacts\Patterns from APT Malware
☆14Mar 4, 2020Updated 6 years ago
Alternatives and similar repositories for APT-Malware-Reports-Set-1
Users that are interested in APT-Malware-Reports-Set-1 are comparing it to the libraries listed below
Sorting:
- ☆14Dec 28, 2020Updated 5 years ago
- 🧬 Mitre Interactive Network Graph (APTs, Malware, Tools, Techniques & Tactics)☆103Apr 26, 2022Updated 3 years ago
- Pure Honeypots with an automated bash script☆21Sep 9, 2021Updated 4 years ago
- ☆25Jun 25, 2021Updated 4 years ago
- Agile Sandbox for analyzing Windows, Linux and macOS malware and execution behaviors☆73Nov 12, 2023Updated 2 years ago
- STIX 2.1 Visualizer, Attack and Activity Thread Graph for Threat Modeling☆33Dec 9, 2024Updated last year
- Malware Analysis, Threat Intelligence and Reverse Engineering: LABS☆82Dec 24, 2020Updated 5 years ago
- ☆13Aug 19, 2015Updated 10 years ago
- Azure-Sentinel-BYOML☆12Nov 8, 2019Updated 6 years ago
- How to bypass your Bell Aliant provided modems.☆13Feb 2, 2026Updated last month
- Modeling, analyzing and rendering attack trees.☆11Sep 9, 2021Updated 4 years ago
- This is useful if you are running an investigation to determine the usage of the same username on different social networks.☆12Dec 10, 2020Updated 5 years ago
- SocialNetSpy© is an information gathering tool based on Python. It obtains all the social network profiles and general informations of a …☆10Oct 14, 2022Updated 3 years ago
- ☆12Jan 5, 2021Updated 5 years ago
- 微软7月布丁增加内存延迟释放机制☆11Jul 19, 2014Updated 11 years ago
- SSDT_process_hide_protect☆10Jul 17, 2014Updated 11 years ago
- Maintain Windows Persistence with an evil Netshell Helper DLL☆12Jul 28, 2018Updated 7 years ago
- Package lmdb-go provides Go bindings and an idiomatic wrapper for the Symas's LMDB database library.☆10Sep 18, 2016Updated 9 years ago
- ☆12Feb 9, 2025Updated last year
- ☆12May 10, 2023Updated 2 years ago
- RepoToStoreBugBountyInfo☆11Mar 11, 2020Updated 5 years ago
- jQuery-based Json to html pretty printer☆26Jun 15, 2012Updated 13 years ago
- A book about how to conduct digital forensic investigations with free and open source tools.☆11Apr 30, 2014Updated 11 years ago
- A script to analyze geographic GSuite Login activity☆10Sep 3, 2017Updated 8 years ago
- ☆12Apr 13, 2017Updated 8 years ago
- Domaintools addon for Maltego☆15Sep 13, 2012Updated 13 years ago
- Ossec cookbook for Chef, with secure & automated key management☆21Jun 13, 2013Updated 12 years ago
- Pascal interpreter for Android.☆23Sep 16, 2010Updated 15 years ago
- ☆11Jun 12, 2023Updated 2 years ago
- fluentd input plugin to extend tail to support multiple line log☆31Oct 13, 2014Updated 11 years ago
- Feature engineering done with Polars☆10Sep 30, 2024Updated last year
- A Fediverse phrase bot inspired by YouTube videos and urban legends about the Deep Web.☆11Jun 4, 2022Updated 3 years ago
- exifprobe☆13Jul 11, 2022Updated 3 years ago
- A Python package that implements common AI techniques used in videogames, meant to be used with PyGame☆12Jun 10, 2019Updated 6 years ago
- An interactive world-map that has been used in live Cyber Threat interfaces☆13Jul 31, 2021Updated 4 years ago
- Professional Phishing Awareness & Cybersecurity Education Platform☆23Oct 17, 2025Updated 4 months ago
- x86/64 Linux Debugger (written w/ python stdlib,ctypes/ptrace)☆10May 16, 2017Updated 8 years ago
- Proof of Concept OSINT visualization☆12Dec 29, 2017Updated 8 years ago
- Search a list of domains on the wayback machine☆15Jun 8, 2019Updated 6 years ago