☆14Oct 25, 2022Updated 3 years ago
Alternatives and similar repositories for APT
Users that are interested in APT are comparing it to the libraries listed below
Sorting:
- ☆15Apr 8, 2023Updated 2 years ago
- Generates YARA rules to detect malware using API hashing☆17Mar 16, 2021Updated 4 years ago
- Sniffpass will alert on cleartext passwords discovered in HTTP POST requests☆17Oct 30, 2023Updated 2 years ago
- A YARA rules repository continuously updated for monitoring the old and new threats from articles, incidents responses ...☆141Nov 19, 2023Updated 2 years ago
- because twin clams are better than one clam?☆29Jan 30, 2026Updated last month
- Lena's scripts/code/resources for malware analysis☆26Jun 13, 2024Updated last year
- A collection of Indicators of Compromise (IoCs), most aligning with samples derived from the signatures in the YARA-Signatures repo☆29Jun 11, 2020Updated 5 years ago
- Triaging Windows event logs based on SANS Poster☆47Nov 22, 2025Updated 3 months ago
- StreamlitとLangGraphで実装したHuman-in-the-loop広告コピー文生成アプリケーション☆11Feb 15, 2025Updated last year
- OOB listener powered by cloudflare workers☆12Apr 13, 2025Updated 10 months ago
- [READ ONLY] Subtree split of the siyuan-packages-monorepo (see https://github.com/Zuoqiu-Yingyi/siyuan-packages-monorepo)☆12Jan 23, 2024Updated 2 years ago
- BIXI is a fast, stable, and powerful DDoS tool designed for efficiency. It supports multiple protocols including TCP, UDP, ICMP, HTTP, an…☆10Apr 9, 2025Updated 10 months ago
- Jupyter Notebooks for Cyber Threat Intelligence☆35Sep 14, 2023Updated 2 years ago
- A set of zeek scripts providing a module for tracking and correlating abnormal DNS behavior.☆35Jan 4, 2025Updated last year
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- Artificial Dog to bark at deer and other garden pests using Raspberry Pi and Groundlight☆12Jun 19, 2024Updated last year
- A small tool to unmap PE memory dumps.☆11Nov 9, 2023Updated 2 years ago
- ☆11Dec 5, 2022Updated 3 years ago
- Are WiFi Passwords we use these day's actually safe?☆10Mar 7, 2017Updated 8 years ago
- ☆10May 8, 2018Updated 7 years ago
- ☆10Jul 8, 2024Updated last year
- A series of functions to parse Teamviewer logs to answer specific questions☆10Jul 17, 2022Updated 3 years ago
- MinIO nodes for n8n☆11Feb 2, 2026Updated last month
- ⚡ Developer-friendly hybrid-RAG toolkit merging Graphiti, Qdrant, mem0, LlamaIndex, and LangChain into one powerful engine.☆15Jan 14, 2026Updated last month
- Extracts SNIs from a pcap and generates output usable in `etc/hosts` file and Burp config for proxying non-proxy-aware thick clients usin…☆12Jun 23, 2020Updated 5 years ago
- Remote Desktop Client Fingerprint script for Zeek. Based off of https://github.com/0x4D31/fatt☆40Jun 20, 2023Updated 2 years ago
- ☆381Updated this week
- OSCP Study Guide☆40Oct 10, 2022Updated 3 years ago
- IDA plugin for YARA signature creation☆19Nov 30, 2025Updated 3 months ago
- 蜜罐检测工具,支持自动化URL去重、多线程控制及智能速率限制。可识别伪装服务。☆16Jun 5, 2025Updated 8 months ago
- Yet Another Fake Honeypot written in Go☆10Dec 8, 2017Updated 8 years ago
- http CONNECT tunnel☆10Mar 26, 2020Updated 5 years ago
- The URL Seeker, an advanced dorking tool for discovering URLs associated with a target domain, also includes SQL injection scanning capab…☆14Dec 15, 2023Updated 2 years ago
- A GPT-based chatbot who knows the content of your Confluence wiki.☆14Apr 22, 2025Updated 10 months ago
- ☆10Dec 24, 2022Updated 3 years ago
- A high interaction virtual ICS honeypot that simulates a PLC and provides physical process simulation.☆16Sep 23, 2024Updated last year
- OpenSSH Vulnerabilities Scanner: Bulk Scanning Tool for 21 different OpenSSH CVEs.☆10Apr 29, 2025Updated 10 months ago
- Plaform independent reverse shell over https☆11Mar 2, 2020Updated 6 years ago
- Set of scripts to index PCAP files and retrieve packets☆14Sep 10, 2015Updated 10 years ago