Skip to content

A curated list of APT tools, frameworks, intelligence platforms, and defensive resources. Designed for researchers and security professionals to explore adversary simulation, malware analysis, threat hunting, and defense strategies in one place.

License

Notifications You must be signed in to change notification settings

ADA-XiaoYao/awesome-APT

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

14 Commits
 
 
 
 
 
 

Repository files navigation

Awesome APTAwesome

A curated list of Advanced Persistent Threat (APT) frameworks, tools, resources, software, and tutorials. This list aims to help security researchers, threat hunters, and defenders find everything related to APT attacks and defense in one place.

Contributing

Please take a quick look at the contribution first. If you know a tool that isn't present here, feel free to open a pull request.

Why?

It takes time to build up a collection of tools used in APT research and remember them all. This repo helps to keep all these scattered tools in one place.

Contents


Attack Simulation

Frameworks & Platforms


Initial Access


Persistence


Lateral Movement

  • CrackMapExec – Swiss army knife for Windows network environments.
  • BloodHound – Active Directory relationship and attack path analysis.
  • Mimikatz – Credential extraction and privilege escalation tool.
  • PsExec – Execute processes on remote Windows systems.
  • Impacket SMBExec – Remote command execution over SMB.
  • Responder – LLMNR/NBT-NS poisoning and credential capture.
  • PowerView – Active Directory reconnaissance framework.
  • SharpHound – Data collector for BloodHound.
  • Rubeus – Kerberos abuse and ticket manipulation.
  • Kerbrute – Kerberos brute force and enumeration tool.

Command & Control

  • Covenant – .NET based C2 framework.
  • Havoc – Modern and modular post-exploitation framework.
  • Merlin – HTTP/2 based cross-platform C2.
  • PoshC2 – PowerShell and Python command and control framework.
  • Mythic – Collaborative red teaming platform.
  • DeimosC2 – Modular cross-platform C2.
  • TrevorC2 – Legitimate website based C2 channel.
  • QuasarRAT – Remote administration and C2 tool.
  • AsyncRAT – Open-source remote access tool.
  • Sliver – Cross-platform implant and C2 framework.

Data Exfiltration

  • DNSExfiltrator – Data exfiltration over DNS queries.
  • DET – Data exfiltration toolkit.
  • Cloakify – Transform data into harmless looking text.
  • Egress-Assess – Test outbound data paths.
  • Iodine – IP over DNS tunneling.
  • DNScat2 – Encrypted DNS command and control tunnel.
  • Ptunnel – ICMP tunneling tool.
  • Rclone – Cloud storage synchronization and transfer.
  • Exfil – File exfiltration over multiple channels.
  • Dropzone – Covert file transfer utility.

Defense & Detection

Threat Hunting

  • MISP – Open threat intelligence sharing platform.
  • OpenCTI – Cyber threat intelligence management.
  • YARA – Pattern matching for malware detection.
  • Sigma – Generic signature format for SIEM systems.
  • Cortex – Observable analysis and response engine.
  • TheHive – Security incident response platform.
  • ThreatHunter Playbook – Threat hunting methodology and analytics.
  • Maltego CE – Link analysis and OSINT platform.
  • Security Onion – Threat hunting and network monitoring distro.
  • GRR Rapid Response – Remote live forensics framework.

Behavioral Analysis

  • Sysmon – System activity monitoring for Windows.
  • Osquery – SQL-powered operating system instrumentation.
  • Velociraptor – Advanced digital forensics and incident response.
  • GRR Rapid Response – Remote live forensics platform.
  • Elastic Endpoint – Endpoint detection and prevention.
  • Wazuh – Open-source security monitoring and EDR.
  • OSSEC – Host-based intrusion detection system.
  • Falco – Runtime security for containers and cloud.
  • Sysdig Secure – Container runtime security monitoring.
  • Redline – Endpoint memory and behavioral analysis tool.

Network Analysis

  • Zeek – Network security monitoring platform.
  • Suricata – High-performance IDS/IPS engine.
  • Wireshark – Network protocol analyzer.
  • Snort – Open-source intrusion detection system.
  • Arkime – Large-scale packet capture and search.
  • ntopng – Network traffic analysis and monitoring.
  • NetworkMiner – Network forensic analysis tool.
  • Brim – Desktop network traffic analysis.
  • tcpdump – Command-line packet analyzer.
  • Corelight – Enterprise Zeek-based network detection.

Memory Forensics


Malware Analysis

  • Ghidra – Software reverse engineering suite.
  • IDA Free – Interactive disassembler and debugger.
  • Cutter – GUI reverse engineering platform.
  • Radare2 – Reverse engineering framework.
  • Cuckoo Sandbox – Automated malware analysis.
  • CAPE Sandbox – Malware configuration extraction.
  • Any.Run – Interactive online malware sandbox.
  • Hybrid Analysis – Online malware analysis platform.
  • PE-sieve – Detect injected malware in processes.
  • x64dbg – Open-source Windows debugger.

Endpoint Detection & Response


Threat Intelligence Platforms


Resources

Operating Systems

  • Kali Linux – Penetration testing and security auditing distribution.
  • Parrot Security OS – Security-focused GNU/Linux distribution.
  • BlackArch – Arch Linux based penetration testing distro.
  • REMnux – Linux toolkit for reverse engineering and malware analysis.
  • Flare VM – Windows malware analysis environment.
  • SIFT Workstation – Digital forensics and incident response distro.
  • Tsurugi Linux – DFIR and OSINT focused Linux distribution.
  • CAINE – Computer Aided Investigative Environment.
  • BackBox – Ubuntu-based security distribution.
  • Security Onion – Network security monitoring OS.

Starter Packs


Tutorials & Courses


Lab Environments


Websites & Blogs


Wikis & Knowledge Bases


Analysis Reports

Annual / Global Threat Reports

Targeted & Thematic APT Reports

Vendor & Red Team Case Studies

Academic & Research Papers

Government & CERT Reports

Datasets & Threat Feeds

Advanced & Unique Resources

Professional & Commercial Extensions

Community & Growth Layer

LICENSE

CC0

About

A curated list of APT tools, frameworks, intelligence platforms, and defensive resources. Designed for researchers and security professionals to explore adversary simulation, malware analysis, threat hunting, and defense strategies in one place.

Resources

License

Contributing

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published