A repository of publicly-available reports and blogs on APT (Advanced Persistent Threat) campaigns, activity, and software, organized by year.
APTnotes is a repository that collects and organizes publicly-available papers, blogs, and reports related to APT (Advanced Persistent Threat) groups, campaigns, and tool-sets. It solves the problem of these reports being lost, taken down, or difficult to track over time by providing a structured, chronological archive with metadata. The data is available in CSV and JSON formats for easy integration and analysis.
Security researchers, DFIR (Digital Forensics and Incident Response) professionals, threat intelligence analysts, and infosec practitioners who need access to historical APT reports for investigation, context, or trend analysis.
Developers and security teams choose APTnotes because it offers a centralized, community-maintained archive of APT-related reports that might otherwise disappear, ensuring long-term accessibility and supporting threat intelligence workflows without proprietary restrictions.
APTnotes data
Provides CSV and JSON files with key metadata like title, source, link, and SHA-1 hash, making it easy to integrate into analysis tools without parsing full reports, as detailed in the README's format examples.
Data is sorted by year in summary files and folders, enabling researchers to track APT activity trends over time, a core feature emphasized in the repository's structure.
Accepts contributions via Twitter, direct contact, or GitHub issues with a template, ensuring the archive grows with community input, as specified in the 'How can I help?' section.
Archives reports on Box to prevent loss or takedowns, addressing the problem of inaccessible resources mentioned in the project's philosophy and ensuring availability for future research.
Relies on Box for report storage, requiring separate scripts from the APTnotes/tools repo for bulk downloads, which adds setup complexity and potential access issues if Box policies change.
Lacks an automated feed; updates depend on community submissions and manual curation via issues or social media, leading to possible delays in incorporating new reports.
Focuses on report metadata without including raw IOCs or full-text content, which may not suffice for advanced threat hunting or projects needing deeper technical analysis.
A collection of awesome penetration testing resources, tools and other shiny things
A curated list of awesome Hacking tutorials, tools and resources
A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.
A curated list of CTF frameworks, libraries, resources and softwares
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.