- APT_CyberCriminal_Campagin_Collections VS DoubleStar
- APT_CyberCriminal_Campagin_Collections VS data
- APT_CyberCriminal_Campagin_Collections VS Resetter
- APT_CyberCriminal_Campagin_Collections VS APT_CyberCriminal_Campagin_C
- APT_CyberCriminal_Campagin_Collections VS Lobsters
- APT_CyberCriminal_Campagin_Collections VS VCDB
- APT_CyberCriminal_Campagin_Collections VS aptly
APT_CyberCriminal_Campagin_Collections Alternatives
Similar projects and alternatives to APT_CyberCriminal_Campagin_Collections
-
DoubleStar
A personalized/enhanced re-creation of the Darkhotel "Double Star" APT exploit chain with a focus on Windows 8.1 and mixed with some of my own techniques
-
-
InfluxDB
Build time-series-based applications quickly and at scale.. InfluxDB is the Time Series Platform where developers build real-time applications for analytics, IoT and cloud-native services. Easy to start, it is available in the cloud or on-premises.
-
Resetter
The easiest way to reset your debian or ubuntu based linux back to stock
-
Lobsters
Computing-focused community centered around link aggregation and discussion
-
-
-
SonarQube
Static code analysis for 29 languages.. Your projects are multi-language. So is SonarQube analysis. Find Bugs, Vulnerabilities, Security Hotspots, and Code Smells so you can release quality code every time. Get started analyzing your projects today for free.
APT_CyberCriminal_Campagin_Collections reviews and mentions
-
Ask HN: Are most security breaches based on social engineering?
You can look at:
- A collection of public threat intel reports [0]. Lot's of reading though. I did some Splunking on it last year and at least 50% uses phishing for initial access. You could call that a structural vulnerability.
- Exploiting vulnerable public facing stuff is another initial access technique. Here someone collected all the CVEs used by ransomware crews:
- VERIS community database: collection of 8894 security incidents. If you look in the JSON there are some fields describing the vector and the actor.
[0] https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_C...
-
Sources, methodology and process used to populate this subreddit
https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections/