Personal compilation of APT malware from whitepaper releases, documents and own research
☆266Feb 7, 2019Updated 7 years ago
Alternatives and similar repositories for Threat-Hunting
Users that are interested in Threat-Hunting are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups☆726Dec 26, 2022Updated 3 years ago
- FCL (Fileless Command Lines) - Known command lines of fileless malicious executions☆478Apr 8, 2021Updated 5 years ago
- Interesting APT Report Collection And Some Special IOCs☆2,979Updated this week
- A curated list of the most important and useful resources about Threat Detection,Hunting and Intelligence.☆579Mar 24, 2023Updated 3 years ago
- Indicators of compromise (IOCs) collected from public resources and categorized by Qi-AnXin.☆968Feb 28, 2026Updated 2 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Repository with Sample threat hunting notebooks on Security Event Log Data Sources☆69Dec 2, 2022Updated 3 years ago
- APT & CyberCriminal Campaign Collection☆4,076Jul 25, 2024Updated last year
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆86Jun 4, 2022Updated 3 years ago
- A collection of resources for Threat Hunters☆917Oct 15, 2024Updated last year
- This repo is where I store my Threat Hunting ideas/content☆90Mar 20, 2026Updated last month
- Powershell collection designed to assist in Threat Hunting Windows systems.☆27Apr 13, 2018Updated 8 years ago
- Python tool and library to help analyze files during malware triage and analysis.☆78Jul 2, 2020Updated 5 years ago
- Windows Events Attack Samples☆2,554Jan 24, 2023Updated 3 years ago
- Telsy CTI Research Team☆57Dec 15, 2020Updated 5 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Threat-Intelligence Feeds & Tools & Frameworks☆222Jun 7, 2024Updated last year
- Repository of YARA rules made by Trellix ATR Team☆627Mar 18, 2025Updated last year
- ☆53Mar 4, 2019Updated 7 years ago
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,544Jan 12, 2026Updated 3 months ago
- A Splunk app mapped to MITRE ATT&CK to guide your threat hunts☆1,182Jul 26, 2023Updated 2 years ago
- Extract and aggregate threat intelligence.☆913Jan 31, 2024Updated 2 years ago
- This repo is dedicated to all my tricks, tweaks and modules for testing and hunting threats. This repo contains multiple directories whic…☆57Jan 10, 2018Updated 8 years ago
- A toolkit for Security Researchers☆125Sep 2, 2019Updated 6 years ago
- Tools to rapidly deploy a threat hunting capability on Azure Sentinel that leverages Sysmon and MITRE ATT&CK☆1,076Nov 28, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Misc Threat Hunting Resources☆378Jan 26, 2023Updated 3 years ago
- Re-play Security Events☆1,746Mar 20, 2024Updated 2 years ago
- ☆350Mar 19, 2021Updated 5 years ago
- DFIRTrack - The Incident Response Tracking Application☆534Jan 13, 2026Updated 3 months ago
- A collection of malware samples and relevant dissection information, most probably referenced from http://blog.inquest.net☆935Mar 26, 2024Updated 2 years ago
- Various commands, tools, techniques that you can use to examine live Windows systems for signs of Compromise or for Threat Hunting.Can al…☆15Aug 15, 2022Updated 3 years ago
- A script to create and assign SOP tasks into the cases☆20Aug 16, 2020Updated 5 years ago
- Malcom - Malware Communications Analyzer☆1,168Nov 29, 2017Updated 8 years ago
- Searches For Threat Hunting and Security Analytics☆239Mar 26, 2025Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Pull some Malware samples here for other security researchers/malware analyst's to analyze and play with.☆172May 29, 2024Updated last year
- PCAP Samples for Different Post Exploitation Techniques☆369Apr 29, 2021Updated 5 years ago
- Your Everyday Threat Intelligence☆1,977Apr 14, 2026Updated 3 weeks ago
- Malwoverview is a first response tool for threat hunting across VirusTotal, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, M…☆3,820Apr 16, 2026Updated 3 weeks ago
- Static file analysis for PE files☆13Dec 4, 2020Updated 5 years ago
- Defanged Indicator of Compromise (IOC) Extractor.☆576Aug 28, 2024Updated last year
- Utilities for Sysmon☆1,638Apr 4, 2026Updated last month