APT & Cybercriminals Campaign Collection Logo

APT & Cybercriminals Campaign Collection

0
Free
Visit Website

This is a collection of APT and cybercriminals campaigns. The password of malware samples could be 'virus' or 'infected'. URL to PDF Tool Print Friendly & PDF Reference Resources include kbandla, APTnotes, Florian Roth - APT Groups, Attack Wiki, threat-INTel, targetedthreats, Raw Threat Intelligence, APT search, APT Sample by 0xffff0800, APT Map, sapphirex00 - Threat-Hunting, APTSimulator, MITRE Att&CK: Group, APT_REPORT collected by @blackorbird, Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups, APT_Digital_Weapon, vx-underground, StrangerealIntel-EternalLiberty. Evasive Panda leverages Monlam Festival to target Tibetans. When Cats Fly: Suspected Iranian Threat Actor UNC1549 Targets Israeli and Middle East Aerospace and Defense Sectors. ConnectWise ScreenConnect attacks deliver malware. inside I-Soon APT(Earth Lusca) operation center. Staying ahead of threat actors in the age of AI. Staying ahead of threat actors in the age of AI. Trend Micro: The Evolution of Cybercrime.

FEATURES

ALTERNATIVES

Repository of Yara signatures for detecting targeted attacks on civil society organizations

MaxMind provides accurate IP geolocation and online fraud detection solutions to create safer digital experiences.

A repository to aid Windows threat hunters in looking for common artifacts.

Collection of YARA signatures from recent malware research.

GCTI's open-source detection signatures for malware and threat detection

Repository of YARA rules for identifying and classifying malware.

In-depth threat intelligence reports and services providing insights into real-world intrusions, malware analysis, and threat briefs.

Generate Bro intel files from pdf or html reports.