This is a collection of APT and cybercriminals campaigns. The password of malware samples could be 'virus' or 'infected'. URL to PDF Tool Print Friendly & PDF Reference Resources include kbandla, APTnotes, Florian Roth - APT Groups, Attack Wiki, threat-INTel, targetedthreats, Raw Threat Intelligence, APT search, APT Sample by 0xffff0800, APT Map, sapphirex00 - Threat-Hunting, APTSimulator, MITRE Att&CK: Group, APT_REPORT collected by @blackorbird, Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups, APT_Digital_Weapon, vx-underground, StrangerealIntel-EternalLiberty. Evasive Panda leverages Monlam Festival to target Tibetans. When Cats Fly: Suspected Iranian Threat Actor UNC1549 Targets Israeli and Middle East Aerospace and Defense Sectors. ConnectWise ScreenConnect attacks deliver malware. inside I-Soon APT(Earth Lusca) operation center. Staying ahead of threat actors in the age of AI. Staying ahead of threat actors in the age of AI. Trend Micro: The Evolution of Cybercrime.
FEATURES
SIMILAR TOOLS
Globally-accessible knowledge base of adversary tactics and techniques for cybersecurity.
Repository of automatically generated YARA rules from Malpedia's YARA-Signator with detailed statistics.
A collection of YARA rules for research and hunting purposes.
Real-time, container-based file scanning system for threat hunting and incident response.
Create deceptive webpages to deceive and redirect attackers away from real websites by cloning them.
A minimalistic Java library for representing threat model data in a normalized way and automating threat intelligence extraction.
A list of most queried domains based on passive DNS usage across the Umbrella global network.
A community-driven public malware repository providing access to malware samples, tools, and resources for the cybersecurity community.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.