APT_CyberCriminal_Campagin_Collections
VCDB
Our great sponsors
APT_CyberCriminal_Campagin_Collections | VCDB | |
---|---|---|
5 | 2 | |
3,240 | 544 | |
- | 0.9% | |
5.7 | 0.0 | |
6 months ago | 6 months ago | |
YARA | Jupyter Notebook | |
- | GNU General Public License v3.0 or later |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
APT_CyberCriminal_Campagin_Collections
-
Ask HN: Are most security breaches based on social engineering?
You can look at:
- A collection of public threat intel reports [0]. Lot's of reading though. I did some Splunking on it last year and at least 50% uses phishing for initial access. You could call that a structural vulnerability.
- Exploiting vulnerable public facing stuff is another initial access technique. Here someone collected all the CVEs used by ransomware crews:
- VERIS community database: collection of 8894 security incidents. If you look in the JSON there are some fields describing the vector and the actor.
[0] https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_C...
-
Sources, methodology and process used to populate this subreddit
https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/
VCDB
-
Ask HN: Are most security breaches based on social engineering?
You can look at:
- A collection of public threat intel reports [0]. Lot's of reading though. I did some Splunking on it last year and at least 50% uses phishing for initial access. You could call that a structural vulnerability.
- Exploiting vulnerable public facing stuff is another initial access technique. Here someone collected all the CVEs used by ransomware crews:
- VERIS community database: collection of 8894 security incidents. If you look in the JSON there are some fields describing the vector and the actor.
[0] https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_C...
What are some alternatives?
DoubleStar - A personalized/enhanced re-creation of the Darkhotel "Double Star" APT exploit chain with a focus on Windows 8.1 and mixed with some of my own techniques
data - APTnotes data
APT_CyberCriminal_Campagin_C
Resetter - The easiest way to reset your debian or ubuntu based linux back to stock
aptly - aptly - Debian repository management tool
Lobsters - Computing-focused community centered around link aggregation and discussion
doublestar - Implements support for double star (**) matches in golang's path.Match and filepath.Glob.