This repository contains various publicly-available documents and notes related to APT, sorted by year, making it easier for automation. For more detailed information on specific malware samples, refer to the individual reports. To contribute new reports, please create a new issue on the repository. Check the README for additional information.
FEATURES
SIMILAR TOOLS
LOKI is a simple IOC and YARA Scanner for Indicators of Compromise Detection.
Maltiverse automates Threat Intelligence for small and medium-sized SecOps teams, providing an effective and affordable service.
Deception based detection techniques with MITRE ATT&CK mapping and Honey Resources.
Pulsedive is a threat intelligence platform that provides frictionless threat intelligence for growing teams, offering features such as indicator enrichment, threat research, and API integration.
Aggregator of FireHOL IP lists with HTTP-based API service and Python client package.
The Cybersecurity and Infrastructure Security Agency (CISA) is a government agency that provides alerts, advisories, and resources to help protect the United States' critical infrastructure from cyber threats.
Official repository of YARA rules for threat detection and hunting
A collection of public YARA signatures for various malware families.
Daily feed of bad IPs with blacklist hit scores for cybersecurity professionals to stay informed about malicious IP addresses.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.