34 results for “topic:advanced-persistent-threat”
Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor
LKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x/6.x (x86/x86_64 and ARM64)
Malware Sample Sources
Bringing you the best of the worst files on the Internet.
🧬 Mitre Interactive Network Graph (APTs, Malware, Tools, Techniques & Tactics)
Extracting Attack Behavior from Threat Reports
Collaborative malware exchange repository.
No description provided.
Adapt practically persistence steadiness strategies working at Windows 10 utilized by sponsored nation-state threat actors, as Turla, ProjectSauron, APT29, EquationGroup, including Stuxnet / Flame.
A curated malware database with more then +73000 samples.
Advanced Persistent Bot, or APBot, is an AI chatbot that provides information on advanced persistent threat (APT) groups.
Materials from the Masterclass I presented on the Off By One Security channel, hosted by Stephen Sims. The sessions covered how to develop and deploy rootkits and included an APT-style emulation demonstrating how such malware can be used operationally.
A technical study about an APT campaign targeting french entities in the construction, real estate and government industries during march 2022, one month before the french presidential elections.
APT Groups and Operations (https://apt.threattracking.com) in SQL
Advanced Red Team C2 Framework written in Rust & Python.
An Advanced Persistent Threat Simulation Example under Loki Detection. Forked from
Unsupervised Analysis Framework for Heterogenous Log-Files (Patterns Extractor)
ADEO APT38 Lazarus Threat Analysis Report
ADEO APT10 Threat Analysis Report
Real-Time Detection of Multi-Stage Attacks using Kill Chain State Machines: Detect multi-stage attacks by correlating alerts from Intrusion Detection Systems (IDS) to generate scenario graphs. By prioritising alerts based on the kill chain model the RT-KCSM reduces false-positive alerts.
Python Phishing Framework to simulate Phishing Campaigns
Static and Dynamic Analysis of Malicious Codes
A RAM-only, AI-enhanced, stealth operating environment for red team simulations and cyber defense training.
No description provided.
A REST API that Scrapes websites for infosec and geopolitical news about threat actors in North Korea, Russia, Iran, and China
Awesome Advanced Persistent Threat Scientific Research
A standard c-code library (`aptlib.h`) for Windows exploit & malware development.
Backup $ Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor
Awesome Advanced Persistent Threat
The WPF-based graphical user interface for interacting with MAGIC - Detecting Advanced Persistent Threats via Masked Graph Representation Learning