APT & Cybercriminals Campaign Collection Logo

APT & Cybercriminals Campaign Collection

0
Free
Visit Website

This is a collection of APT and cybercriminals campaigns. The password of malware samples could be 'virus' or 'infected'. URL to PDF Tool Print Friendly & PDF Reference Resources include kbandla, APTnotes, Florian Roth - APT Groups, Attack Wiki, threat-INTel, targetedthreats, Raw Threat Intelligence, APT search, APT Sample by 0xffff0800, APT Map, sapphirex00 - Threat-Hunting, APTSimulator, MITRE Att&CK: Group, APT_REPORT collected by @blackorbird, Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups, APT_Digital_Weapon, vx-underground, StrangerealIntel-EternalLiberty. Evasive Panda leverages Monlam Festival to target Tibetans. When Cats Fly: Suspected Iranian Threat Actor UNC1549 Targets Israeli and Middle East Aerospace and Defense Sectors. ConnectWise ScreenConnect attacks deliver malware. inside I-Soon APT(Earth Lusca) operation center. Staying ahead of threat actors in the age of AI. Staying ahead of threat actors in the age of AI. Trend Micro: The Evolution of Cybercrime.

FEATURES

ALTERNATIVES

NECOMA focuses on data collection, threat analysis, and developing new cyberdefense mechanisms to protect infrastructure and endpoints.

Tool for visualizing correspondences between YARA ruleset and samples

Maltego transform pack for analyzing and graphing Honeypots using MySQL data.

A threat intelligence domain/IP/hash threat feeds checker that checks IPVoid, URLVoid, Virustotal, and Cymon.

A container of PCAP captures mapped to the relevant attack tactic

An all-in-one email outreach platform for finding and connecting with professionals, with features for lead discovery, email verification, and cold email campaigns.

A daily collection of IOCs from various sources, including articles and tweets.

A tool for tracking, scanning, and filtering yara files with distributed scanning capabilities.