h4cker
APTnotes
h4cker | APTnotes | |
---|---|---|
4 | 5 | |
16,589 | 3,410 | |
2.1% | - | |
9.2 | 3.1 | |
8 days ago | 4 months ago | |
Jupyter Notebook | ||
MIT License | - |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
h4cker
- Ciberseguridad / hacking etico
-
Cybersecurity Repositories
The Art of Hacking Series
- What's the "best" coding language to know/learn?
-
How to use a home lab to study Penetration Testing?
https://github.com/The-Art-of-Hacking/h4cker is a good repo
APTnotes
-
Ask HN: What Happened with the Grugq Article?
>with case studies and getting as niche on specific things as possible.
Then definitely you can touch on APT marketplace, unlike the usual zeroday ones, those are -as the name implies, advanced, and mostly are state sponsored, you can find some of these in this sheet [1], or other sources [2] or older ones [3]. Now, for other zero day exploits, you can dig into your typical threat intelligence feeds to have an idea, some of these are daily updated [4] [5] [6] among a lot more of other resources, there are also underground databases for zero day and even APT updated as of yesterday, and also online marketplaces for those where you can buy/sell compromised RDP servers / webmail / cPanels / etc., or even services like smtp-sms for phishing among others, unfortunately, I can’t and won’t list any of these in here for obvious reasons, however, if you dig a little deeper definitely you will find something, just don’t use the usual search engines and normal channels, and get the usual security precautions like sandbox/vpns/etc. when access any of these sites, preferably in an isolated OS too.
And thanks, not expert enough for sure!
[1] https://docs.google.com/spreadsheets/u/1/d/1H9_xaxQHpWaa4O_S...
[2] https://gist.github.com/Neo23x0/c4f40629342769ad0a8f3980942e...
[3] https://github.com/kbandla/APTnotes
[4] https://bazaar.abuse.ch/browse/
[5] https://www.exploitalert.com/browse-exploit.html
[6] https://threatfox.abuse.ch/browse/
-
Seeking Datasets on Malware
I trained up this repo in my privateGPT - https://github.com/kbandla/APTnotes
- Le Burkina Faso
-
Cybersecurity Repositories
APT Notes
- Les ressortissants russes en France reçoivent en ce moment sur leurs numéros de téléphone russe des demandes pour l'enrôlement dans l'armée en vue de la guerre avec l'Ukraine
What are some alternatives?
Vulnnr - Vulnnr - Vulnerability Scanner And Mass Exploiter, created for pentesting.
data - APTnotes data
Microsoft-365-Defender-Hunting-Queries - Sample queries for Advanced hunting in Microsoft 365 Defender
ThreatHunter-Playbook - A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more efficient.
RomBuster - RomBuster is a router exploitation tool that allows to disclosure network router admin password.
awesome-ctf - A curated list of CTF frameworks, libraries, resources and softwares
Hydroxide - Lua runtime introspection and network capturing tool for games on the Roblox engine.
osx-and-ios-security-awesome - OSX and iOS related security tools
vulscan - Advanced vulnerability scanning with Nmap NSE
awesome-adversarial-machine-learning - A curated list of awesome adversarial machine learning resources
dora - Find exposed API keys based on RegEx and get exploitation methods for some of keys that are found
awesome-iocs - A collection of sources of indicators of compromise.