APT & Cybercriminals Campaign Collection Logo

APT & Cybercriminals Campaign Collection

0
Free
Visit Website

This is a collection of APT and cybercriminals campaigns. The password of malware samples could be 'virus' or 'infected'. URL to PDF Tool Print Friendly & PDF Reference Resources include kbandla, APTnotes, Florian Roth - APT Groups, Attack Wiki, threat-INTel, targetedthreats, Raw Threat Intelligence, APT search, APT Sample by 0xffff0800, APT Map, sapphirex00 - Threat-Hunting, APTSimulator, MITRE Att&CK: Group, APT_REPORT collected by @blackorbird, Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups, APT_Digital_Weapon, vx-underground, StrangerealIntel-EternalLiberty. Evasive Panda leverages Monlam Festival to target Tibetans. When Cats Fly: Suspected Iranian Threat Actor UNC1549 Targets Israeli and Middle East Aerospace and Defense Sectors. ConnectWise ScreenConnect attacks deliver malware. inside I-Soon APT(Earth Lusca) operation center. Staying ahead of threat actors in the age of AI. Staying ahead of threat actors in the age of AI. Trend Micro: The Evolution of Cybercrime.

FEATURES

ALTERNATIVES

Maltego transform pack for analyzing and graphing Honeypots using MySQL data.

A curated list of resources for learning about deploying, managing, and hunting with Microsoft Sysmon.

A modular tool for collecting intelligence sources for files and outputting in CSV format.

A community-driven public malware repository providing access to malware samples, tools, and resources for the cybersecurity community.

Automated framework for collecting and processing samples from VirusTotal with YARA rule integration.

LOKI is a simple IOC and YARA Scanner for Indicators of Compromise Detection.

A tool for tracking, scanning, and filtering yara files with distributed scanning capabilities.

Malware Patrol offers a range of threat intelligence solutions, including enterprise data feeds, DNS firewall, phishing threat intelligence, and small business protection.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved