| route-pattern | /:user_id/:repository |
| route-controller | files |
| route-action | disambiguate |
| fetch-nonce | v2:2edba0af-707e-da58-0fca-bab662958805 |
| current-catalog-service-hash | f3abb0cc802f3d7b95fc8762b94bdcb13bf39634c40c357301c4aa1d67a256fb |
| request-id | BF86:308A8E:2D64810:3AD38F7:6974D97B |
| html-safe-nonce | df795afb80403fec9d0dbd7aab4c07b101c6d5199a8335f014527418e4f4cba2 |
| visitor-payload | eyJyZWZlcnJlciI6IiIsInJlcXVlc3RfaWQiOiJCRjg2OjMwOEE4RToyRDY0ODEwOjNBRDM4Rjc6Njk3NEQ5N0IiLCJ2aXNpdG9yX2lkIjoiNjE0MDMyNjczNjk2MjA1MDQyNyIsInJlZ2lvbl9lZGdlIjoiaWFkIiwicmVnaW9uX3JlbmRlciI6ImlhZCJ9 |
| visitor-hmac | 3068ad802c24a2d5e823a0e6959a0c798e3ec0feb126e8fabe3eaba84827896f |
| hovercard-subject-tag | repository:28680540 |
| github-keyboard-shortcuts | repository,copilot |
| google-site-verification | Apib7-x98H0j5cPqHWwSMm6dNU4GmODRoqxLiDzdx9I |
| octolytics-url | https://collector.github.com/github/collect |
| analytics-location | // |
| fb:app_id | 1401488693436528 |
| apple-itunes-app | app-id=1477376905, app-argument=https://github.com/Jacob08/APTnotes |
| twitter:image | https://opengraph.githubassets.com/686afaba7e4142be69bb41612ed1624d2d893637d0ff89c4d75b3bea5598be04/Jacob08/APTnotes |
| twitter:card | summary_large_image |
| og:image | https://opengraph.githubassets.com/686afaba7e4142be69bb41612ed1624d2d893637d0ff89c4d75b3bea5598be04/Jacob08/APTnotes |
| og:image:alt | Various public documents, whitepapers and articles about APT campaigns - Jacob08/APTnotes |
| og:image:width | 1200 |
| og:image:height | 600 |
| og:site_name | GitHub |
| og:type | object |
| hostname | github.com |
| expected-hostname | github.com |
| None | 4a4bf5f4e28041a9d2e5c107d7d20b78b4294ba261cab243b28167c16a623a1f |
| turbo-cache-control | no-preview |
| go-import | github.com/Jacob08/APTnotes git https://github.com/Jacob08/APTnotes.git |
| octolytics-dimension-user_id | 3151711 |
| octolytics-dimension-user_login | Jacob08 |
| octolytics-dimension-repository_id | 28680540 |
| octolytics-dimension-repository_nwo | Jacob08/APTnotes |
| octolytics-dimension-repository_public | true |
| octolytics-dimension-repository_is_fork | true |
| octolytics-dimension-repository_parent_id | 13110052 |
| octolytics-dimension-repository_parent_nwo | kbandla/APTnotes |
| octolytics-dimension-repository_network_root_id | 13110052 |
| octolytics-dimension-repository_network_root_nwo | kbandla/APTnotes |
| turbo-body-classes | logged-out env-production page-responsive |
| disable-turbo | false |
| browser-stats-url | https://api.github.com/_private/browser/stats |
| browser-errors-url | https://api.github.com/_private/browser/errors |
| release | 488b30e96dfd057fbbe44c6665ccbc030b729dde |
| ui-target | full |
| theme-color | #1e2327 |
| color-scheme | light dark |
| Skip to content | https://patch-diff.githubusercontent.com/Jacob08/APTnotes#start-of-content |
|
| https://patch-diff.githubusercontent.com/ |
|
Sign in
| https://patch-diff.githubusercontent.com/login?return_to=https%3A%2F%2Fgithub.com%2FJacob08%2FAPTnotes |
| GitHub CopilotWrite better code with AI | https://github.com/features/copilot |
| GitHub SparkBuild and deploy intelligent apps | https://github.com/features/spark |
| GitHub ModelsManage and compare prompts | https://github.com/features/models |
| MCP RegistryNewIntegrate external tools | https://github.com/mcp |
| ActionsAutomate any workflow | https://github.com/features/actions |
| CodespacesInstant dev environments | https://github.com/features/codespaces |
| IssuesPlan and track work | https://github.com/features/issues |
| Code ReviewManage code changes | https://github.com/features/code-review |
| GitHub Advanced SecurityFind and fix vulnerabilities | https://github.com/security/advanced-security |
| Code securitySecure your code as you build | https://github.com/security/advanced-security/code-security |
| Secret protectionStop leaks before they start | https://github.com/security/advanced-security/secret-protection |
| Why GitHub | https://github.com/why-github |
| Documentation | https://docs.github.com |
| Blog | https://github.blog |
| Changelog | https://github.blog/changelog |
| Marketplace | https://github.com/marketplace |
| View all features | https://github.com/features |
| Enterprises | https://github.com/enterprise |
| Small and medium teams | https://github.com/team |
| Startups | https://github.com/enterprise/startups |
| Nonprofits | https://github.com/solutions/industry/nonprofits |
| App Modernization | https://github.com/solutions/use-case/app-modernization |
| DevSecOps | https://github.com/solutions/use-case/devsecops |
| DevOps | https://github.com/solutions/use-case/devops |
| CI/CD | https://github.com/solutions/use-case/ci-cd |
| View all use cases | https://github.com/solutions/use-case |
| Healthcare | https://github.com/solutions/industry/healthcare |
| Financial services | https://github.com/solutions/industry/financial-services |
| Manufacturing | https://github.com/solutions/industry/manufacturing |
| Government | https://github.com/solutions/industry/government |
| View all industries | https://github.com/solutions/industry |
| View all solutions | https://github.com/solutions |
| AI | https://github.com/resources/articles?topic=ai |
| Software Development | https://github.com/resources/articles?topic=software-development |
| DevOps | https://github.com/resources/articles?topic=devops |
| Security | https://github.com/resources/articles?topic=security |
| View all topics | https://github.com/resources/articles |
| Customer stories | https://github.com/customer-stories |
| Events & webinars | https://github.com/resources/events |
| Ebooks & reports | https://github.com/resources/whitepapers |
| Business insights | https://github.com/solutions/executive-insights |
| GitHub Skills | https://skills.github.com |
| Documentation | https://docs.github.com |
| Customer support | https://support.github.com |
| Community forum | https://github.com/orgs/community/discussions |
| Trust center | https://github.com/trust-center |
| Partners | https://github.com/partners |
| GitHub SponsorsFund open source developers | https://github.com/sponsors |
| Security Lab | https://securitylab.github.com |
| Maintainer Community | https://maintainers.github.com |
| Accelerator | https://github.com/accelerator |
| Archive Program | https://archiveprogram.github.com |
| Topics | https://github.com/topics |
| Trending | https://github.com/trending |
| Collections | https://github.com/collections |
| Enterprise platformAI-powered developer platform | https://github.com/enterprise |
| GitHub Advanced SecurityEnterprise-grade security features | https://github.com/security/advanced-security |
| Copilot for BusinessEnterprise-grade AI features | https://github.com/features/copilot/copilot-business |
| Premium SupportEnterprise-grade 24/7 support | https://github.com/premium-support |
| Pricing | https://github.com/pricing |
| Search syntax tips | https://docs.github.com/search-github/github-code-search/understanding-github-code-search-syntax |
| documentation | https://docs.github.com/search-github/github-code-search/understanding-github-code-search-syntax |
|
Sign in
| https://patch-diff.githubusercontent.com/login?return_to=https%3A%2F%2Fgithub.com%2FJacob08%2FAPTnotes |
|
Sign up
| https://patch-diff.githubusercontent.com/signup?ref_cta=Sign+up&ref_loc=header+logged+out&ref_page=%2F%3Cuser-name%3E%2F%3Crepo-name%3E&source=header-repo&source_repo=Jacob08%2FAPTnotes |
| Reload | https://patch-diff.githubusercontent.com/Jacob08/APTnotes |
| Reload | https://patch-diff.githubusercontent.com/Jacob08/APTnotes |
| Reload | https://patch-diff.githubusercontent.com/Jacob08/APTnotes |
|
Jacob08
| https://patch-diff.githubusercontent.com/Jacob08 |
| APTnotes | https://patch-diff.githubusercontent.com/Jacob08/APTnotes |
| kbandla/APTnotes | https://patch-diff.githubusercontent.com/kbandla/APTnotes |
|
Notifications
| https://patch-diff.githubusercontent.com/login?return_to=%2FJacob08%2FAPTnotes |
|
Fork
0
| https://patch-diff.githubusercontent.com/login?return_to=%2FJacob08%2FAPTnotes |
|
Star
0
| https://patch-diff.githubusercontent.com/login?return_to=%2FJacob08%2FAPTnotes |
|
0
stars
| https://patch-diff.githubusercontent.com/Jacob08/APTnotes/stargazers |
|
884
forks
| https://patch-diff.githubusercontent.com/Jacob08/APTnotes/forks |
|
Branches
| https://patch-diff.githubusercontent.com/Jacob08/APTnotes/branches |
|
Tags
| https://patch-diff.githubusercontent.com/Jacob08/APTnotes/tags |
|
Activity
| https://patch-diff.githubusercontent.com/Jacob08/APTnotes/activity |
|
Star
| https://patch-diff.githubusercontent.com/login?return_to=%2FJacob08%2FAPTnotes |
|
Notifications
| https://patch-diff.githubusercontent.com/login?return_to=%2FJacob08%2FAPTnotes |
|
Code
| https://patch-diff.githubusercontent.com/Jacob08/APTnotes |
|
Pull requests
0
| https://patch-diff.githubusercontent.com/Jacob08/APTnotes/pulls |
|
Actions
| https://patch-diff.githubusercontent.com/Jacob08/APTnotes/actions |
|
Projects
0
| https://patch-diff.githubusercontent.com/Jacob08/APTnotes/projects |
|
Wiki
| https://patch-diff.githubusercontent.com/Jacob08/APTnotes/wiki |
|
Security
0
| https://patch-diff.githubusercontent.com/Jacob08/APTnotes/security |
|
Insights
| https://patch-diff.githubusercontent.com/Jacob08/APTnotes/pulse |
|
Code
| https://patch-diff.githubusercontent.com/Jacob08/APTnotes |
|
Pull requests
| https://patch-diff.githubusercontent.com/Jacob08/APTnotes/pulls |
|
Actions
| https://patch-diff.githubusercontent.com/Jacob08/APTnotes/actions |
|
Projects
| https://patch-diff.githubusercontent.com/Jacob08/APTnotes/projects |
|
Wiki
| https://patch-diff.githubusercontent.com/Jacob08/APTnotes/wiki |
|
Security
| https://patch-diff.githubusercontent.com/Jacob08/APTnotes/security |
|
Insights
| https://patch-diff.githubusercontent.com/Jacob08/APTnotes/pulse |
| Branches | https://patch-diff.githubusercontent.com/Jacob08/APTnotes/branches |
| Tags | https://patch-diff.githubusercontent.com/Jacob08/APTnotes/tags |
| https://patch-diff.githubusercontent.com/Jacob08/APTnotes/branches |
| https://patch-diff.githubusercontent.com/Jacob08/APTnotes/tags |
| 142 Commits | https://patch-diff.githubusercontent.com/Jacob08/APTnotes/commits/master/ |
| https://patch-diff.githubusercontent.com/Jacob08/APTnotes/commits/master/ |
| 2008 | https://patch-diff.githubusercontent.com/Jacob08/APTnotes/tree/master/2008 |
| 2008 | https://patch-diff.githubusercontent.com/Jacob08/APTnotes/tree/master/2008 |
| 2009 | https://patch-diff.githubusercontent.com/Jacob08/APTnotes/tree/master/2009 |
| 2009 | https://patch-diff.githubusercontent.com/Jacob08/APTnotes/tree/master/2009 |
| 2010 | https://patch-diff.githubusercontent.com/Jacob08/APTnotes/tree/master/2010 |
| 2010 | https://patch-diff.githubusercontent.com/Jacob08/APTnotes/tree/master/2010 |
| 2011 | https://patch-diff.githubusercontent.com/Jacob08/APTnotes/tree/master/2011 |
| 2011 | https://patch-diff.githubusercontent.com/Jacob08/APTnotes/tree/master/2011 |
| 2012 | https://patch-diff.githubusercontent.com/Jacob08/APTnotes/tree/master/2012 |
| 2012 | https://patch-diff.githubusercontent.com/Jacob08/APTnotes/tree/master/2012 |
| 2013 | https://patch-diff.githubusercontent.com/Jacob08/APTnotes/tree/master/2013 |
| 2013 | https://patch-diff.githubusercontent.com/Jacob08/APTnotes/tree/master/2013 |
| 2014 | https://patch-diff.githubusercontent.com/Jacob08/APTnotes/tree/master/2014 |
| 2014 | https://patch-diff.githubusercontent.com/Jacob08/APTnotes/tree/master/2014 |
| historical | https://patch-diff.githubusercontent.com/Jacob08/APTnotes/tree/master/historical |
| historical | https://patch-diff.githubusercontent.com/Jacob08/APTnotes/tree/master/historical |
| .gitignore | https://patch-diff.githubusercontent.com/Jacob08/APTnotes/blob/master/.gitignore |
| .gitignore | https://patch-diff.githubusercontent.com/Jacob08/APTnotes/blob/master/.gitignore |
| README.md | https://patch-diff.githubusercontent.com/Jacob08/APTnotes/blob/master/README.md |
| README.md | https://patch-diff.githubusercontent.com/Jacob08/APTnotes/blob/master/README.md |
| contributors.md | https://patch-diff.githubusercontent.com/Jacob08/APTnotes/blob/master/contributors.md |
| contributors.md | https://patch-diff.githubusercontent.com/Jacob08/APTnotes/blob/master/contributors.md |
| papers.md | https://patch-diff.githubusercontent.com/Jacob08/APTnotes/blob/master/papers.md |
| papers.md | https://patch-diff.githubusercontent.com/Jacob08/APTnotes/blob/master/papers.md |
| README | https://patch-diff.githubusercontent.com/Jacob08/APTnotes |
| https://patch-diff.githubusercontent.com/Jacob08/APTnotes#apt-notes |
| https://patch-diff.githubusercontent.com/Jacob08/APTnotes#contributing |
| contributors | https://github.com/kbandla/APTnotes/blob/master/contributors.md |
| https://patch-diff.githubusercontent.com/Jacob08/APTnotes#papers |
| papers | https://github.com/kbandla/APTnotes/blob/master/papers.md |
| https://patch-diff.githubusercontent.com/Jacob08/APTnotes#2006 |
| "Wicked Rose" and the NCPH Hacking Group | http://krebsonsecurity.com/wp-content/uploads/2012/11/WickedRose_andNCPH.pdf |
| https://patch-diff.githubusercontent.com/Jacob08/APTnotes#2008 |
| Russian Invasion of Georgia Russian Cyberwar on Georgia | http://www.mfa.gov.ge/files/556_10535_798405_Annex87_CyberAttacks.pdf |
| How China will use cyber warfare to leapfrog in military competitiveness | http://www.international-relations.com/CM8-1/Cyberwar.pdf |
| China's Electronic Long-Range Reconnaissance | http://fmso.leavenworth.army.mil/documents/chinas-electronic.pdf |
| Agent.BTZ | http://www.wired.com/dangerroom/2008/11/army-bans-usb-d/ |
| https://patch-diff.githubusercontent.com/Jacob08/APTnotes#2009 |
| Impact of Alleged Russian Cyber Attacks | https://www.bdcol.ee/files/files/documents/Research/BSDR2009/1_%20Ashmore%20-%20Impact%20of%20Alleged%20Russian%20Cyber%20Attacks%20.pdf |
| Tracking GhostNet | http://www.nartv.org/mirror/ghostnet.pdf |
| https://patch-diff.githubusercontent.com/Jacob08/APTnotes#2010 |
| Operation Aurora | http://en.wikipedia.org/wiki/Operation_Aurora |
| The Command Structure of the Aurora Botnet - Damballa | https://www.damballa.com/downloads/r_pubs/Aurora_Botnet_Command_Structure.pdf |
| McAfee Labs: Combating Aurora | https://kc.mcafee.com/resources/sites/MCAFEE/content/live/CORP_KNOWLEDGEBASE/67000/KB67957/en_US/Combating%20Threats%20-%20Operation%20Aurora.pdf |
| Operation Aurora Detect, Diagnose, Respond | http://albertsblog.stickypatch.org/files/3/5/1/4/7/282874-274153/Aurora_HBGARY_DRAFT.pdf |
| Case Study: Operation Aurora - Triumfant | http://www.triumfant.com/pdfs/Case_Study_Operation_Aurora_V11.pdf |
| How Can I Tell if I Was Infected By Aurora? (IOCs) | http://www.mcafee.com/us/local_content/reports/how_can_u_tell.pdf |
| In-depth Analysis of Hydraq | http://www.totaldefense.com/Core/DownloadDoc.aspx?documentID=1052 |
| Shadows in the cloud: Investigating Cyber Espionage 2.0 | http://www.nartv.org/mirror/shadows-in-the-cloud.pdf |
| The "MSUpdater" Trojan And Ongoing Targeted Attacks | http://www.seculert.com/reports/MSUpdaterTrojanWhitepaper.pdf |
| W32.Stuxnet Dossier | http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/w32_stuxnet_dossier.pdf |
| The Stuxnet Computer Worm: Harbinger of an Emerging Warfare Capability | http://www.fas.org/sgp/crs/natsec/R41524.pdf |
| https://patch-diff.githubusercontent.com/Jacob08/APTnotes#2011 |
| Global Energy Cyberattacks: Night Dragon | http://www.mcafee.com/us/resources/white-papers/wp-global-energy-cyberattacks-night-dragon.pdf |
| Night Dragon Specific Protection Measures for Consideration | http://www.nerc.com/pa/rrm/bpsa/Alerts%20DL/2011%20Alerts/A-2011-02-18-01%20Night%20Dragon%20Attachment%201.pdf |
| Stuxnet Under the Microscope | http://www.eset.com/us/resources/white-papers/Stuxnet_Under_the_Microscope.pdf |
| Shady RAT | http://en.wikipedia.org/wiki/Operation_Shady_RAT |
| Operation Shady RAT | http://www.mcafee.com/us/resources/white-papers/wp-operation-shady-rat.pdf |
| Operation Shady rat : Vanity | http://www.vanityfair.com/culture/features/2011/09/operation-shady-rat-201109 |
| HTran and the Advanced Persistent Threat | http://www.secureworks.com/cyber-threat-intelligence/threats/htran/ |
| The RSA Hack | http://www.fidelissecurity.com/sites/default/files/FTA1001-The_RSA_Hack.pdf |
| SK Hack by an Advanced Persistent Threat | http://www.commandfive.com/papers/C5_APT_SKHack.pdf |
| The "LURID" Downloader | http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp_dissecting-lurid-apt.pdf |
| Alleged APT Intrusion Set: "1.php" Group | http://www.zscaler.com/pdf/technicalbriefs/tb_advanced_persistent_threats.pdf |
| Duqu Trojan Questions and Answers | http://www.secureworks.com/cyber-threat-intelligence/threats/duqu/ |
| The Nitro Attacks: Stealing Secrets from the Chemical Industry | http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/the_nitro_attacks.pdf |
| https://patch-diff.githubusercontent.com/Jacob08/APTnotes#2012 |
| The HeartBeat APT | http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp_the-heartbeat-apt-campaign.pdf |
| Command and Control in the Fifth Domain | http://www.commandfive.com/papers/C5_APT_C2InTheFifthDomain.pdf |
| The Sin Digoo Affair | http://www.secureworks.com/cyber-threat-intelligence/threats/sindigoo/ |
| Crouching Tiger, Hidden Dragon, Stolen Data | http://www.contextis.com/services/research/white-papers/crouching-tiger-hidden-dragon-stolen-data/ |
| Reversing DarkComet RAT's crypto | http://www.arbornetworks.com/asert/wp-content/uploads/2012/07/Crypto-DarkComet-Report.pdf |
| Luckycat Redux | http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp_luckycat_redux.pdf |
| Anatomy of a Gh0st RAT | http://www.mcafee.com/us/resources/white-papers/foundstone/wp-know-your-digital-enemy.pdf |
| OSX.SabPub & Confirmed Mac APT attacks | http://securelist.com/blog/incidents/33208/new-version-of-osx-sabpub-confirmed-mac-apt-attacks-19/ |
| Analysis of Flamer C&C Server | http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/w32_flamer_newsforyou.pdf |
| IXESHEA An APT Campaign | http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp_ixeshe.pdf |
| sKyWIper (Flame/Flamer) | http://www.crysys.hu/skywiper/skywiper.pdf |
| Advanced Social Engineering for the Distribution of LURK Malware | https://citizenlab.org/wp-content/uploads/2012/07/10-2012-recentobservationsintibet.pdf |
| Wired article on DarkComet creator | http://www.wired.com/2012/07/dark-comet-syrian-spy-tool/ |
| The Madi Campaign | https://securelist.com/analysis/36609/the-madi-infostealers-a-detailed-analysis/ |
| Gauss: Abnormal Distribution | http://kasperskycontenthub.com/wp-content/uploads/sites/43/vlpdfs/kaspersky-lab-gauss.pdf |
| The Elderwood Project | http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/the-elderwood-project.pdf |
| IEXPLORE RAT | https://citizenlab.org/wp-content/uploads/2012/09/IEXPL0RE_RAT.pdf |
| The VOHO Campaign: An in depth analysis | http://blogsdev.rsa.com/wp-content/uploads/VOHO_WP_FINAL_READY-FOR-Publication-09242012_AC.pdf |
| The Mirage Campaign | http://www.secureworks.com/cyber-threat-intelligence/threats/the-mirage-campaign/ |
| Matasano notes on DarkComet, Bandook, CyberGate and Xtreme RAT | http://matasano.com/research/PEST-CONTROL.pdf |
| Trojan.Taidoor: Targeting Think Tanks | http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/trojan_taidoor-targeting_think_tanks.pdf |
| RECOVERING FROM SHAMOON | http://www.fidelissecurity.com/sites/default/files/FTA%201007%20-%20Shamoon.pdf |
| Systematic cyber attacks against Israeli and Palestinian targets going on for a year | http://download01.norman.no/whitepapers/Cyberattack_against_Israeli_and_Palestinian_targets.pdf |
| https://patch-diff.githubusercontent.com/Jacob08/APTnotes#2013 |
| Ooperation Red October | https://kc.mcafee.com/resources/sites/MCAFEE/content/live/PRODUCT_DOCUMENTATION/24000/PD24250/en_US/McAfee_Labs_Threat_Advisory_Exploit_Operation_Red_Oct.pdf |
| Targeted cyber attacks: examples and challenges ahead | http://www.ait.ac.at/uploads/media/Presentation_Targeted-Attacks_EN.pdf |
| Operation SnowMan: DeputyDog Actor Compromises US Veterans of Foreign Wars Website | http://www.fireeye.com/blog/technical/cyber-exploits/2014/02/operation-snowman-deputydog-actor-compromises-us-veterans-of-foreign-wars-website.html |
| Mandiant APT1 Report | http://intelreport.mandiant.com/Mandiant_APT1_Report.pdf |
| Comment Crew: Indicators of Compromise | http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/comment_crew_indicators_of_compromise.pdf |
| Stuxnet 0.5: The Missing Link | http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/stuxnet_0_5_the_missing_link.pdf |
| The MiniDuke Mystery: PDF 0-day Government Spy Assembler 0x29A Micro Backdoor | https://www.securelist.com/en/downloads/vlpdfs/themysteryofthepdf0-dayassemblermicrobackdoor.pdf |
| Miniduke: Indicators v1 | http://www.crysys.hu/miniduke/miniduke_indicators_public.pdf |
| You Only Click Twice: FinFisher’s Global Proliferation | https://citizenlab.org/wp-content/uploads/2013/07/15-2013-youonlyclicktwice.pdf |
| Safe: A Targeted Threat | http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-safe-a-targeted-threat.pdf |
| Dissecting Operation Troy | http://www.mcafee.com/sg/resources/white-papers/wp-dissecting-operation-troy.pdf |
| The TeamSpy Crew Attacks | http://securelist.com/blog/incidents/35520/the-teamspy-crew-attacks-abusing-teamviewer-for-cyberespionage-8/ |
| Darkseoul/Jokra Analysis And Recovery | http://www.fidelissecurity.com/sites/default/files/FTA%201008%20-%20Darkseoul-Jokra%20Analysis%20and%20Recovery.pdf |
| APT1: technical backstage (Terminator/Fakem RAT) | http://www.malware.lu/Pro/RAP002_APT1_Technical_backstage.1.0.pdf |
| TR-12 - Analysis of a PlugX malware variant used for targeted attacks | http://www.circl.lu/pub/tr-12/ |
| Trojan.APT.BaneChant | http://www.fireeye.com/blog/technical/malware-research/2013/04/trojan-apt-banechant-in-memory-trojan-that-observes-for-multiple-mouse-clicks.html |
| "Winnti" More than just a game | http://www.securelist.com/en/downloads/vlpdfs/winnti-more-than-just-a-game-130410.pdf |
| Operation Hangover | http://normanshark.com/pdf/Norman_HangOver%20report_Executive%20Summary_042513.pdf |
| Operation Hangover | http://normanshark.com/pdf/Unveiling%20an%20Indian%20Cyberattack%20Infrastructure%20-%20appendixes.pdf |
| TR-14 - Analysis of a stage 3 Miniduke malware sample | http://www.circl.lu/pub/tr-14/ |
| The Chinese Malware Complexes: The Maudi Surveillance Operation | http://normanshark.com/wp-content/uploads/2013/06/NormanShark-MaudiOperation.pdf |
| Crude Faux: An analysis of cyber conflict within the oil & gas industries | https://www.cerias.purdue.edu/assets/pdf/bibtex_archive/2013-9.pdf |
| The NetTraveller (aka 'Travnet') | http://www.securelist.com/en/downloads/vlpdfs/kaspersky-the-net-traveler-part1-final.pdf |
| KeyBoy, Targeted Attacks against Vietnam and India | https://community.rapid7.com/community/infosec/blog/2013/06/07/keyboy-targeted-attacks-against-vietnam-and-india |
| Trojan.APT.Seinup Hitting ASEAN | http://www.fireeye.com/blog/technical/malware-research/2013/06/trojan-apt-seinup-hitting-asean.html |
| A Call to Harm: New Malware Attacks Target the Syrian Opposition | https://citizenlab.org/wp-content/uploads/2013/07/19-2013-acalltoharm.pdf |
| njRAT Uncovered | http://threatgeek.typepad.com/files/fta-1009---njrat-uncovered-1.pdf |
| Dark Seoul Cyber Attack: Could it be worse? | https://patch-diff.githubusercontent.com/Jacob08/APTnotes/blob/master/cisak.perpika.kr/wp-content/uploads/2013/07/2013-08.pdf |
| PlugX revisited: "Smoaler" | http://sophosnews.files.wordpress.com/2013/07/sophosszappanosplugxrevisitedintroducingsmoaler-rev1.pdf |
| Secrets of the Comfoo Masters | http://www.secureworks.com/cyber-threat-intelligence/threats/secrets-of-the-comfoo-masters/ |
| Blackhat: In-Depth Analysis of Escalated APT Attacks (Lstudio,Elirks) | https://media.blackhat.com/us-13/US-13-Yarochkin-In-Depth-Analysis-of-Escalated-APT-Attacks-Slides.pdf |
| video | https://www.youtube.com/watch?v=SoFVRsvh8s0 |
| Operation Hangover - Unveiling an Indian Cyberattack Infrastructure | http://normanshark.com/wp-content/uploads/2013/08/NS-Unveiling-an-Indian-Cyberattack-Infrastructure_FINAL_Web.pdf |
| APT Attacks on Indian Cyber Space | http://g0s.org/wp-content/uploads/2013/downloads/Inside_Report_by_Infosec_Consortium.pdf |
| Where There is Smoke, There is Fire: South Asian Cyber Espionage Heats Up | http://www.threatconnect.com/news/where-there-is-smoke-there-is-fire-south-asian-cyber-espionage-heats-up/ |
| Surtr: Malware Family Targeting the Tibetan Community | https://citizenlab.org/2013/08/surtr-malware-family-targeting-the-tibetan-community/ |
| ByeBye Shell and the targeting of Pakistan | https://community.rapid7.com/community/infosec/blog/2013/08/19/byebye-and-the-targeting-of-pakistan |
| POISON IVY: Assessing Damage and Extracting Intelligence | http://www.fireeye.com/resources/pdfs/fireeye-poison-ivy-report.pdf |
| Operation Molerats: Middle East Cyber Attacks Using Poison Ivy | http://www.fireeye.com/blog/technical/2013/08/operation-molerats-middle-east-cyber-attacks-using-poison-ivy.html |
| Feature: EvilGrab Campaign Targets Diplomatic Agencies | http://about-threats.trendmicro.com/cloud-content/us/ent-primers/pdf/2q-report-on-targeted-attack-campaigns.pdf |
| The "Kimsuky" Operation | https://securelist.com/analysis/57915/the-kimsuky-operation-a-north-korean-apt/ |
| Operation DeputyDog: Zero-Day (CVE-2013-3893) Attack Against Japanese Targets | http://www.fireeye.com/blog/technical/cyber-exploits/2013/09/operation-deputydog-zero-day-cve-2013-3893-attack-against-japanese-targets.html |
| Hidden Lynx - Professional Hackers for Hire | http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/hidden_lynx.pdf |
| The 'ICEFROG' APT: A Tale of cloak and three daggers | http://www.securelist.com/en/downloads/vlpdfs/icefog.pdf |
| World War C: State of affairs in the APT world | http://www.fireeye.com/blog/technical/threat-intelligence/2013/09/new-fireeye-report-world-war-c.html |
| Terminator RAT | http://www.fireeye.com/blog/technical/malware-research/2013/10/evasive-tactics-terminator-rat.html |
| FakeM RAT | http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-fakem-rat.pdf |
| Operation Ephemeral Hydra: IE Zero-Day Linked to DeputyDog Uses Diskless Method | http://www.fireeye.com/blog/technical/cyber-exploits/2013/11/operation-ephemeral-hydra-ie-zero-day-linked-to-deputydog-uses-diskless-method.html |
| Supply Chain Analysis | http://www.fireeye.com/resources/pdfs/fireeye-malware-supply-chain.pdf |
| njRAT, The Saga Continues | http://www.fidelissecurity.com/files/files/FTA%201010%20-%20njRAT%20The%20Saga%20Continues.pdf |
| Operation "Ke3chang" | http://www.fireeye.com/resources/pdfs/fireeye-operation-ke3chang.pdf |
| ETSO APT Attacks Analysis | http://image.ahnlab.com/global/upload/download/documents/1401223631603288.pdf |
| Deep Panda | http://www.crowdstrike.com/sites/default/files/AdversaryIntelligenceReport_DeepPanda_0.pdf |
| Detecting and Defeating the China Chopper Web Shell | http://www.fireeye.com/resources/pdfs/fireeye-china-chopper-report.pdf |
| https://patch-diff.githubusercontent.com/Jacob08/APTnotes#2014 |
| PlugX: some uncovered points | http://blog.cassidiancybersecurity.com/2014/01/plugx-some-uncovered-points.html |
| Targeted attacks against the Energy Sector | http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/targeted_attacks_against_the_energy_sector.pdf |
| The Icefog APT Hits US Targets With Java Backdoor | https://www.securelist.com/en/blog/208214213/The_Icefog_APT_Hits_US_Targets_With_Java_Backdoor |
| “New'CDTO:'A'Sneakernet'Trojan'Solution | http://www.fidelissecurity.com/sites/default/files/FTA%201001%20FINAL%201.15.14.pdf |
| Shell_Crew (Deep Panda) | http://www.emc.com/collateral/white-papers/h12756-wp-shell-crew.pdf |
| Intruder File Report- Sneakernet Trojan | http://www.fidelissecurity.com/sites/default/files/FTA%201011%20Follow%20UP.pdf |
| Unveiling "Careto" - The Masked APT | http://www.securelist.com/en/downloads/vlpdfs/unveilingthemask_v1.0.pdf |
| Operation SnowMan: DeputyDog Actor Compromises US Veterans of Foreign Wars Website | http://www.fireeye.com/blog/technical/cyber-exploits/2014/02/operation-snowman-deputydog-actor-compromises-us-veterans-of-foreign-wars-website.html |
| The Monju Incident | http://contextis.com/resources/blog/context-threat-intelligence-monju-incident/ |
| XtremeRAT: Nuisance or Threat? | http://www.fireeye.com/blog/technical/2014/02/xtremerat-nuisance-or-threat.html |
| Operation GreedyWonk: Multiple Economic and Foreign Policy Sites Compromised, Serving Up Flash Zero-Day Exploit | http://www.fireeye.com/blog/technical/targeted-attack/2014/02/operation-greedywonk-multiple-economic-and-foreign-policy-sites-compromised-serving-up-flash-zero-day-exploit.html |
| Mo' Shells Mo' Problems - Deep Panda Web Shells | http://www.crowdstrike.com/blog/mo-shells-mo-problems-deep-panda-web-shells/ |
| Gathering in the Middle East, Operation STTEAM | http://www.fidelissecurity.com/sites/default/files/FTA%201012%20STTEAM%20Final.pdf |
| Uroburos: Highly complex espionage software with Russian roots | https://public.gdatasoftware.com/Web/Content/INT/Blog/2014/02_2014/documents/GData_Uroburos_RedPaper_EN_v1.pdf |
| The Siesta Campaign | http://blog.trendmicro.com/trendlabs-security-intelligence/the-siesta-campaign-a-new-targeted-attack-awakens/ |
| Snake Campaign & Cyber Espionage Toolkit | http://info.baesystemsdetica.com/rs/baesystems/images/snake_whitepaper.pdf |
| Russian spyware Turla | http://www.reuters.com/article/2014/03/07/us-russia-cyberespionage-insight-idUSBREA260YI20140307 |
| CVE-2014-1776: Operation Clandestine Fox | http://www.fireeye.com/blog/uncategorized/2014/04/new-zero-day-exploit-targeting-internet-explorer-versions-9-through-11-identified-in-targeted-attacks.html |
| Operation Saffron Rose (aka Flying Kitten) | http://www.fireeye.com/resources/pdfs/fireeye-operation-saffron-rose.pdf |
| CrowdStrike's report on Flying Kitten | http://blog.crowdstrike.com/cat-scratch-fever-crowdstrike-tracks-newly-reported-iranian-actor-flying-kitten/ |
| Miniduke Twitter C&C | http://www.welivesecurity.com/2014/05/20/miniduke-still-duking/ |
| RAT in jar: A phishing campaign using Unrecom | http://www.fidelissecurity.com/sites/default/files/FTA_1013_RAT_in_a_jar.pdf |
| Illuminating The Etumbot APT Backdoor (APT12) | http://www.arbornetworks.com/asert/wp-content/uploads/2014/06/ASERT-Threat-Intelligence-Brief-2014-07-Illuminating-Etumbot-APT.pdf |
| Putter Panda | http://cdn0.vox-cdn.com/assets/4589853/crowdstrike-intelligence-report-putter-panda.original.pdf |
| Embassy of Greece Beijing | http://thegoldenmessenger.blogspot.de/2014/06/blitzanalysis-embassy-of-greece-beijing.html |
| Dragonfly: Cyberespionage Attacks Against Energy Suppliers | http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/Dragonfly_Threat_Against_Western_Energy_Suppliers.pdf |
| Anatomy of the Attack: Zombie Zero | http://www.trapx.com/wp-content/uploads/2014/07/TrapX_ZOMBIE_Report_Final.pdf |
| Deep Pandas | http://blog.crowdstrike.com/deep-thought-chinese-targeting-national-security-think-tanks/ |
| TR-25 Analysis - Turla / Pfinet / Snake/ Uroburos | http://www.circl.lu/pub/tr-25/ |
| Pitty Tiger | http://bitbucket.cassidiancybersecurity.com/whitepapers/downloads/Pitty%20Tiger%20Final%20Report.pdf |
| Sayad (Flying Kitten) Analysis & IOCs | http://vinsula.com/2014/07/20/sayad-flying-kitten-infostealer-malware/ |
| Energetic Bear/Crouching Yeti | https://kasperskycontenthub.com/securelist/files/2014/07/EB-YetiJuly2014-Public.pdf |
| Energetic Bear/Crouching Yeti Appendix | http://25zbkz3k00wn2tp5092n6di7b5k.wpengine.netdna-cdn.com/files/2014/07/Kaspersky_Lab_crouching_yeti_appendixes_eng_final.pdf |
| Sidewinder Targeted Attack Against Android | http://www.fireeye.com/resources/pdfs/fireeye-sidewinder-targeted-attack.pdf |
| Operation Arachnophobia | http://threatc.s3-website-us-east-1.amazonaws.com/?/arachnophobia |
| Operation Poisoned Hurricane | http://www.fireeye.com/blog/technical/targeted-attack/2014/08/operation-poisoned-hurricane.html |
| The Epic Turla Operation Appendix | https://securelist.com/files/2014/08/KL_Epic_Turla_Technical_Appendix_20140806.pdf |
| New York Times Attackers Evolve Quickly (Aumlib/Ixeshe/APT12) | http://www.fireeye.com/blog/technical/2013/08/survival-of-the-fittest-new-york-times-attackers-evolve-quickly.html |
| A Look at Targeted Attacks Through the Lense of an NGO | http://www.mpi-sws.org/~stevens/pubs/sec14.pdf |
| The Syrian Malware House of Cards | https://securelist.com/blog/research/66051/the-syrian-malware-house-of-cards/ |
| El Machete | https://securelist.com/blog/research/66108/el-machete/ |
| Vietnam APT Campaign | http://blog.malwaremustdie.org/2014/08/another-country-sponsored-malware.html |
| NetTraveler APT Gets a Makeover for 10th Birthday | https://securelist.com/blog/research/66272/nettraveler-apt-gets-a-makeover-for-10th-birthday/ |
| North Korea’s cyber threat landscape | http://h30499.www3.hp.com/hpeb/attachments/hpeb/off-by-on-software-security-blog/388/2/HPSR%20SecurityBriefing_Episode16_NorthKorea.pdf |
| Scanbox: A Reconnaissance Framework Used with Watering Hole Attacks | https://www.alienvault.com/open-threat-exchange/blog/scanbox-a-reconnaissance-framework-used-on-watering-hole-attacks |
| Syrian Malware Team Uses BlackWorm for Attacks | http://www.fireeye.com/blog/technical/2014/08/connecting-the-dots-syrian-malware-team-uses-blackworm-for-attacks.html |
| Darwin’s Favorite APT Group (APT12) | http://www.fireeye.com/blog/technical/botnet-activities-research/2014/09/darwins-favorite-apt-group-2.html |
| Forced to Adapt: XSLCmd Backdoor Now on OS X | http://www.fireeye.com/blog/technical/malware-research/2014/09/forced-to-adapt-xslcmd-backdoor-now-on-os-x.html |
| Targeted Threat Index: Characterizingand Quantifying Politically-MotivatedTargeted Malware | https://www.usenix.org/system/files/conference/usenixsecurity14/sec14-paper-hardy.pdf |
| video | https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/hardy |
| When Governments Hack Opponents: A Look at Actors and Technology | https://www.usenix.org/system/files/conference/usenixsecurity14/sec14-paper-marczak.pdf |
| video | https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/marczak |
| Operation Quantum Entanglement | http://www.fireeye.com/resources/pdfs/white-papers/fireeye-operation-quantum-entanglement.pdf |
| Chinese intrusions into key defense contractors | http://www.armed-services.senate.gov/press-releases/sasc-investigation-finds-chinese-intrusions-into-key-defense-contractors |
| COSMICDUKE: Cosmu with a twist of MiniDuke | http://www.f-secure.com/documents/996508/1030745/cosmicduke_whitepaper.pdf |
| Watering Hole Attacks using Poison Ivy by "th3bug" group | http://researchcenter.paloaltonetworks.com/2014/09/recent-watering-hole-attacks-attributed-apt-group-th3bug-using-poison-ivy/ |
| Ukraine and Poland Targeted by BlackEnergy (video) | https://www.youtube.com/watch?v=I77CGqQvPE4 |
| Aided Frame, Aided Direction (Sunshop Digital Quartermaster) | http://www.fireeye.com/blog/technical/2014/09/aided-frame-aided-direction-because-its-a-redirect.html |
| BlackEnergy & Quedagh | https://www.f-secure.com/documents/996508/1030745/blackenergy_whitepaper.pdf |
| New indicators for APT group Nitro | http://researchcenter.paloaltonetworks.com/2014/10/new-indicators-compromise-apt-group-nitro-uncovered/ |
| Democracy in Hong Kong Under Attack | http://www.volexity.com/blog/?p=33 |
| ZoxPNG Preliminary Analysis | http://www.novetta.com/files/9114/1329/6233/ZoxPNG_Preliminary_Analysis.pdf |
| Hikit Preliminary Analysis | http://www.novetta.com/files/1714/1329/6231/Hikit_Preliminary_Analysis.pdf |
| Derusbi Preliminary Analysis | http://www.novetta.com/files/3014/1329/6230/Derusbi_Server_Preliminary_Analysis.pdf |
| Group 72 (Axiom) | http://blogs.cisco.com/security/talos/threat-spotlight-group-72/ |
| Sandworm - CVE-2104-4114 | http://www.isightpartners.com/2014/10/cve-2014-4114/ |
| OrcaRAT - A whale of a tale | http://pwc.blogs.com/cyber_security_updates/2014/10/orcarat-a-whale-of-a-tale.html |
| Operation Pawn Storm: The Red in SEDNIT | http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-operation-pawn-storm.pdf |
| Sofacy Phishing by PWC | http://pwc.blogs.com/files/tactical-intelligence-bulletin---sofacy-phishing-.pdf |
| Modified Tor Binaries | http://www.leviathansecurity.com/blog/the-case-of-the-modified-binaries/ |
| LeoUncia and OrcaRat | http://blog.airbuscybersecurity.com/post/2014/10/LeoUncia-and-OrcaRat |
| Full Disclosure of Havex Trojans - ICS Havex backdoors | http://www.netresec.com/?page=Blog&month=2014-10&post=Full-Disclosure-of-Havex-Trojans |
| ScanBox framework – who’s affected, and who’s using it? | http://pwc.blogs.com/cyber_security_updates/2014/10/scanbox-framework-whos-affected-and-whos-using-it-1.html |
| APT28 - A Window Into Russia's Cyber Espionage Operations | https://patch-diff.githubusercontent.com/Jacob08/APTnotes/blob/master/www.fireeye.com/resources/pdfs/apt28.pdf |
| Group 72, Opening the ZxShell | http://blogs.cisco.com/talos/opening-zxshell/ |
| The Rotten Tomato Campaign | http://blogs.sophos.com/2014/10/30/the-rotten-tomato-campaign-new-sophoslabs-research-on-apts/ |
| Operation TooHash | https://blog.gdatasoftware.com/blog/article/operation-toohash-how-targeted-attacks-work.html |
| New observations on BlackEnergy2 APT activity | https://securelist.com/blog/research/67353/be2-custom-plugins-router-abuse-and-target-profiles/ |
| Operation Poisoned Handover: Unveiling Ties Between APT Activity in Hong Kong’s Pro-Democracy Movement | http://www.fireeye.com/blog/technical/2014/11/operation-poisoned-handover-unveiling-ties-between-apt-activity-in-hong-kongs-pro-democracy-movement.html |
| The Darkhotel APT - A Story of Unusual Hospitality | https://securelist.com/blog/research/66779/the-darkhotel-apt/ |
| The Uroburos case- Agent.BTZ’s successor, ComRAT | http://blog.gdatasoftware.com/blog/article/the-uroburos-case-new-sophisticated-rat-identified.html |
| Korplug military targeted attacks: Afghanistan & Tajikistan | http://www.welivesecurity.com/2014/11/12/korplug-military-targeted-attacks-afghanistan-tajikistan/ |
| Operation CloudyOmega: Ichitaro 0-day targeting Japan | http://www.symantec.com/connect/blogs/operation-cloudyomega-ichitaro-zero-day-and-ongoing-cyberespionage-campaign-targeting-japan |
| OnionDuke: APT Attacks Via the Tor Network | http://www.f-secure.com/weblog/archives/00002764.html |
| Roaming Tiger (Slides) | http://2014.zeronights.ru/assets/files/slides/roaming_tiger_zeronights_2014.pdf |
| Operation Double Tap | https://www.fireeye.com/blog/threat-research/2014/11/operation_doubletap.html |
| IOCs | https://github.com/fireeye/iocs/tree/master/APT3 |
| Symantec's report on Regin | http://www.symantec.com/connect/blogs/regin-top-tier-espionage-tool-enables-stealthy-surveillance |
| Kaspersky's report on The Regin Platform | http://securelist.com/blog/research/67741/regin-nation-state-ownage-of-gsm-networks/ |
| https://firstlook.org/theintercept/2014/11/24/secret-regin-malware-belgacom-nsa-gchq/ | https://firstlook.org/theintercept/2014/11/24/secret-regin-malware-belgacom-nsa-gchq/ |
| FIN4: Stealing Insider Information for an Advantage in Stock Trading? | https://www.fireeye.com/blog/threat-research/2014/11/fin4_stealing_insid.html |
| Operation Cleaver | http://www.cylance.com/operation-cleaver/ |
| IOCs | http://www.cylance.com/assets/Cleaver/cleaver.yar |
| Operation Cleaver: The Notepad Files | http://blog.cylance.com/operation-cleaver-the-notepad-files |
| The 'Penquin' Turla | http://securelist.com/blog/research/67962/the-penquin-turla-2/ |
| The Inception Framework | https://www.bluecoat.com/security-blog/2014-12-09/blue-coat-exposes-%E2%80%9C-inception-framework%E2%80%9D-very-sophisticated-layered-malware |
| Cloud Atlas: RedOctober APT | http://securelist.com/blog/research/68083/cloud-atlas-redoctober-apt-is-back-in-style/ |
| W32/Regin, Stage #1 | https://www.f-secure.com/documents/996508/1030745/w32_regin_stage_1.pdf |
| W64/Regin, Stage #1 | https://www.f-secure.com/documents/996508/1030745/w64_regin_stage_1.pdf |
| South Korea MBR Wiper | http://asec.ahnlab.com/1015 |
| Vinself now with steganography | http://blog.cybersecurity-airbusds.com/post/2014/12/Vinself |
| Bots, Machines, and the Matrix | http://www.fidelissecurity.com/sites/default/files/FTA_1014_Bots_Machines_and_the_Matrix.pdf |
| Wiper Malware – A Detection Deep Dive | http://blogs.cisco.com/security/talos/wiper-malware |
| Malware Attack Targeting Syrian ISIS Critics | https://citizenlab.org/2014/12/malware-attack-targeting-syrian-isis-critics/ |
| TA14-353A: Targeted Destructive Malware (wiper) | https://www.us-cert.gov/ncas/alerts/TA14-353A |
| Operation Poisoned Helmand | http://www.threatconnect.com/news/operation-poisoned-helmand/ |
| Anunak: APT against financial institutions | http://www.group-ib.com/files/Anunak_APT_against_financial_institutions.pdf |
|
Readme
| https://patch-diff.githubusercontent.com/Jacob08/APTnotes#readme-ov-file |
| Please reload this page | https://patch-diff.githubusercontent.com/Jacob08/APTnotes |
|
Activity | https://patch-diff.githubusercontent.com/Jacob08/APTnotes/activity |
|
0
stars | https://patch-diff.githubusercontent.com/Jacob08/APTnotes/stargazers |
|
1
watching | https://patch-diff.githubusercontent.com/Jacob08/APTnotes/watchers |
|
0
forks | https://patch-diff.githubusercontent.com/Jacob08/APTnotes/forks |
|
Report repository
| https://patch-diff.githubusercontent.com/contact/report-content?content_url=https%3A%2F%2Fgithub.com%2FJacob08%2FAPTnotes&report=Jacob08+%28user%29 |
| Releases | https://patch-diff.githubusercontent.com/Jacob08/APTnotes/releases |
| Packages
0 | https://patch-diff.githubusercontent.com/users/Jacob08/packages?repo_name=APTnotes |
|
| https://github.com |
| Terms | https://docs.github.com/site-policy/github-terms/github-terms-of-service |
| Privacy | https://docs.github.com/site-policy/privacy-policies/github-privacy-statement |
| Security | https://github.com/security |
| Status | https://www.githubstatus.com/ |
| Community | https://github.community/ |
| Docs | https://docs.github.com/ |
| Contact | https://support.github.com?tags=dotcom-footer |