Just another collection of links, tools, reports and other stuff
-
Updated
Jun 22, 2021 - Python
Just another collection of links, tools, reports and other stuff
Storage for the IOCs I collect
A complete hands-on reference of 46 Windows persistence techniques used by real-world APT groups. Each technique includes MITRE ATT&CK TTP mapping, known threat actor attribution, attack commands, verification steps, and cleanup — organized from No-Admin to Admin level. Built for red teamers, malware analysts, and cybersecurity learners.
Add a description, image, and links to the malware-resources topic page so that developers can more easily learn about it.
To associate your repository with the malware-resources topic, visit your repo's landing page and select "manage topics."