All in one - Malware + Analysis by Cylance
☆11Nov 23, 2018Updated 7 years ago
Alternatives and similar repositories for APT32_OceanLotus_ThreatGroup
Users that are interested in APT32_OceanLotus_ThreatGroup are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Useful windows tools for Blue, Red & Purple teams☆11Mar 8, 2026Updated 3 weeks ago
- Scripts, Yara rules and other files developed during malware investigations☆27Aug 19, 2022Updated 3 years ago
- Dracula inspired theme for Ghidra☆12Dec 3, 2019Updated 6 years ago
- Vagrant Files to create a Virtualbox VM for Malware Analysis☆13Jun 1, 2021Updated 4 years ago
- Azure Deployment Templates for Mandiant Managed Huning☆12Jun 1, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆41Apr 5, 2025Updated 11 months ago
- a database that collects data related to APTs from existing public sources through a semi automatic methodology and produces an exhaustiv…☆18Nov 22, 2022Updated 3 years ago
- ☆16Jul 17, 2021Updated 4 years ago
- Various config files obtained during malware analysis☆67Oct 31, 2018Updated 7 years ago
- Exporting MISP event attributes to yara rules usable with Thor apt scanner☆24Mar 27, 2017Updated 9 years ago
- https://code.google.com/archive/p/delfem/☆13Jul 9, 2018Updated 7 years ago
- Daemon to enable Target Display Mode on iMac automatically without Physical Keyboard☆13Nov 16, 2018Updated 7 years ago
- Yet another TCP proxy. Very simple to use -- just edit config file and run. Supports Linux, Freebsd and Windows; IPv4 and IPv6, Python 2…☆14Nov 30, 2012Updated 13 years ago
- ☆13Sep 5, 2019Updated 6 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- CLI interface to get Ransomware attacks data from ransomwhat.telemetry.ltd☆13Feb 8, 2023Updated 3 years ago
- ☆21Apr 19, 2024Updated last year
- PoC for DHCP vulnerability (NAME:WRECK) in FreeBSD☆15Apr 14, 2021Updated 4 years ago
- Start and stop AWS resources managed by Cloudformation for cost savings☆11Jan 24, 2023Updated 3 years ago
- a recon framework that facilitates discovering, scanning and monitoring assets trough a configurable engine running on serverless aws inf…☆12Aug 26, 2024Updated last year
- Documents pertaining to internal policies and guidelines☆12Jan 20, 2017Updated 9 years ago
- Premantel - A Malware analysis and Threat Intel Framework☆36Mar 22, 2019Updated 7 years ago
- Python command-line tool that uses nearest neighbor search methods for malware similarity analysis☆16Jan 29, 2019Updated 7 years ago
- Historical Observations of Actionable Reputation Data☆13Jun 26, 2018Updated 7 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- 👓 monitoring, alerting and threat analysis for ELK stack☆11Mar 27, 2017Updated 9 years ago
- Hunt for Keywords , Mutex, Windows Event,Registry Keys,Process,Schedule tasks in Windows Machine☆22Dec 8, 2024Updated last year
- This repository contains scripts and dataset for a Apt Identification Triage System☆17Nov 3, 2019Updated 6 years ago
- TMTG(Twint Mention to Graph) is tools for converting twint user mentions data to network graph for use in Gephi or others network mapping…☆13Aug 5, 2021Updated 4 years ago
- ssdeep cluster analysis for malware files☆31Jun 5, 2020Updated 5 years ago
- Analysis Reports of Malwares☆14Jun 21, 2019Updated 6 years ago
- SolarWinds Orion API 远程代码执行漏洞批量检测脚本☆10Jan 5, 2021Updated 5 years ago
- DbgFlashVul☆12Sep 8, 2015Updated 10 years ago
- ☆11Aug 8, 2018Updated 7 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- An implementation of a device tracking technique based on Algorithm 4 (Double-Hash Port Selection) of RFC 6056.☆16Sep 28, 2022Updated 3 years ago
- Scanning Result of MetaScan's AI GPTScan Engine for 13 DefiHacks Projects under 10 Logic Vuln Types☆13Aug 8, 2023Updated 2 years ago
- Code used in analysis and visualisation of IUCN threat maps☆15Aug 26, 2021Updated 4 years ago
- Tracking APT IOCs☆25Nov 16, 2020Updated 5 years ago
- Can you pay the ransom in your country?☆14Dec 18, 2023Updated 2 years ago
- A repository for the generation, visualization, and evaluation of patch based adversarial attacks on the yoloV3 object detection system☆18Jun 8, 2021Updated 4 years ago
- Another MISP module for Python☆18Feb 17, 2020Updated 6 years ago