APT & Cybercriminals Campaign Collection Logo

APT & Cybercriminals Campaign Collection

0
Free
Visit Website

This is a collection of APT and cybercriminals campaigns. The password of malware samples could be 'virus' or 'infected'. URL to PDF Tool Print Friendly & PDF Reference Resources include kbandla, APTnotes, Florian Roth - APT Groups, Attack Wiki, threat-INTel, targetedthreats, Raw Threat Intelligence, APT search, APT Sample by 0xffff0800, APT Map, sapphirex00 - Threat-Hunting, APTSimulator, MITRE Att&CK: Group, APT_REPORT collected by @blackorbird, Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups, APT_Digital_Weapon, vx-underground, StrangerealIntel-EternalLiberty. Evasive Panda leverages Monlam Festival to target Tibetans. When Cats Fly: Suspected Iranian Threat Actor UNC1549 Targets Israeli and Middle East Aerospace and Defense Sectors. ConnectWise ScreenConnect attacks deliver malware. inside I-Soon APT(Earth Lusca) operation center. Staying ahead of threat actors in the age of AI. Staying ahead of threat actors in the age of AI. Trend Micro: The Evolution of Cybercrime.

FEATURES

ALTERNATIVES

A cybersecurity concept categorizing indicators of compromise based on their level of difficulty for threat actors to change.

Tool for visualizing correspondences between YARA ruleset and samples

An extendable tool to extract and aggregate IOCs from threat feeds, integrates with ThreatKB and MISP.

Open Source Threat Intelligence Gathering and Processing Framework

YARA signature and IOC database for LOKI and THOR Lite scanners with high quality rules and IOCs.

A reference implementation for collecting events and performing CAR analytics to detect potential adversary activity.

Cortex is a tool for analyzing observables at scale and automating threat intelligence, digital forensics, and incident response.

Acapulco is a Splunk application that automatically generates meta-events from hpfeeds channels and visualizes them using D3.js.