This is a collection of APT and cybercriminals campaigns. The password of malware samples could be 'virus' or 'infected'. URL to PDF Tool Print Friendly & PDF Reference Resources include kbandla, APTnotes, Florian Roth - APT Groups, Attack Wiki, threat-INTel, targetedthreats, Raw Threat Intelligence, APT search, APT Sample by 0xffff0800, APT Map, sapphirex00 - Threat-Hunting, APTSimulator, MITRE Att&CK: Group, APT_REPORT collected by @blackorbird, Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups, APT_Digital_Weapon, vx-underground, StrangerealIntel-EternalLiberty. Evasive Panda leverages Monlam Festival to target Tibetans. When Cats Fly: Suspected Iranian Threat Actor UNC1549 Targets Israeli and Middle East Aerospace and Defense Sectors. ConnectWise ScreenConnect attacks deliver malware. inside I-Soon APT(Earth Lusca) operation center. Staying ahead of threat actors in the age of AI. Staying ahead of threat actors in the age of AI. Trend Micro: The Evolution of Cybercrime.
FEATURES
SIMILAR TOOLS
A nonprofit security organization that collects and shares threat data to make the Internet more secure.
VirusTotal API v3 is a threat intelligence platform for scanning files, URLs, and IP addresses, and retrieving reports on threat reputation and context.
A project that detects malicious SSL connections by identifying and blacklisting SSL certificates used by botnet C&C servers and identifying JA3 fingerprints to detect and block malware botnet C&C communication.
FraudGuard is a service that provides real-time internet traffic analysis and IP tracking to help validate usage and prevent fraud.
Packet Storm is a global security resource providing around-the-clock information and tools to mitigate personal data and fiscal loss on a global scale.
A platform providing real-time threat intelligence streams and reports on internet-exposed assets to help organizations monitor and secure their attack surface.
CRITs is an open source malware and threat repository for collaborative threat defense and analysis.
A comprehensive Threat Intelligence Program Management Solution for managing the entire CTI lifecycle.
ThreatMiner is a threat intelligence portal that aggregates data from various sources and provides contextual information related to indicators of compromise (IOCs).
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.