├── LICENSE ├── README.md └── raw_corpus ├── APT ├── apt-001-olympic-destroyer.yaml ├── apt-002-bluemushroom.yaml ├── apt-003-oceanlotus.yaml ├── apt-004-bitter.yaml ├── apt-005-apt38-lazarus.yaml ├── apt-006-operation-aurora.yaml ├── apt-007-night-dragon.yaml ├── apt-008-shady-rat.yaml ├── apt-009-nitro-attack.yaml ├── apt-010-apt28-uefi.yaml ├── apt-011-darkhotel.yaml ├── apt-012-slingshot.yaml └── apt-013-stuxnet.yaml ├── BT ├── bt-003-webshell_upload_memory_shell.yaml ├── bt-004-cobaltstrike_beacon_http.yaml └── bt-005-webshell_behinder_4_0.yaml ├── CM ├── cm-001-azure-blob-misconfiguration.yaml └── cm-002-azure-sas-token-misconfiguration.yaml ├── DDoS ├── ddos-001-hybrid-http-range-attack.yaml └── ddos-002-ntp-reflection-rddos-attack.yaml ├── DS └── ds-001-oracle-apt-defense-success.yaml ├── FA ├── fa-001-phishing-email-sage-2-2-infection.yaml └── fa-002-tmobile-sim-swap-mfa-bypass.yaml ├── HT ├── ht-002-smbexec_remote_execution.yaml ├── ht-003-pystinger_tunnel_communication.yaml ├── ht-004-metasploit_payload_transmission.yaml └── ht-005-neo_regeorg_tunnel_communication.yaml ├── IL ├── IL-002-web_root_directory_information_leakage.yaml └── il-001-github_sensitive_information_leakage.yaml ├── IT ├── it-001-twitter-insider-account-hijack.yaml ├── it-002-ex-employee-revenge-sabotage.yaml ├── it-003-rdp-lateral-movement.yaml ├── it-004-internal-ipc-bruteforce.yaml ├── it-005-cracked-software-spread.yaml ├── it-006-unauthorized-port-forwarding.yaml ├── it-007-multi-hop-rdp.yaml ├── it-008-ssh-key-theft-ansible.yaml ├── it-009-usb-internal-spread.yaml └── it-010-incident-response-failure-log-loss.yaml ├── MC ├── mc-001-mining_trojan_communication.yaml ├── mc-002-outlaw-botnet-mining-ddos.yaml ├── mc-003-tor2mine-powershell-mimikatz.yaml ├── mc-004-teamtnt-docker-kubernetes-attack.yaml ├── mc-005-h2miner-multi-vulnerability-attack.yaml ├── mc-006-sysrv-hello-web-infection-spread.yaml └── mc-007-cloud-shovel-targeted-bruteforce.yaml ├── README.md ├── SC ├── sc-001-rsa-securid-theft-apt.yaml ├── sc-002-solarwinds-supply-chain-sunburst.yaml ├── sc-003-kaseya-vsa-supply-chain-revil-ransomware.yaml ├── sc-004-ccleaner-supply-chain-staged-payload.yaml ├── sc-005-3cx-supply-chain-dll-sideloading.yaml ├── sc-006-asus-live-update-shadowhammer.yaml ├── sc-007-codecov-supply-chain-cicd.yaml ├── sc-008-xcodeghost-supply-chain.yaml ├── sc-009-xz-utils-supply-chain-backdoor.yaml ├── sc-010-npm-ua-parser-js-supply-chain.yaml ├── sc-011-wordpress-plugin-backdoor.yaml ├── sc-012-unicode-trojan-source.yaml ├── sc-013-chrome-extension-oauth-hijack.yaml ├── sc-014-pypi-typosquatting-attack.yaml ├── sc-015-xshell-backdoor-supply-chain.yaml ├── sc-016-wirex-android-botnet-google-play.yaml ├── sc-017-fake-laomaotao-pe-tool.yaml ├── sc-018-putty-cn-backdoor.yaml ├── sc-019-kuzzle-malware-stolen-signature.yaml ├── sc-020-isp-update-hijacking.yaml └── sc-021-havex-ics-supply-chain-attack.yaml ├── VR ├── vr-001-exchange_proxylogon_cve_2021_27065.yaml ├── vr-002-ms17-010-ransomware-infection.yaml ├── vr-003-ics-it-ot-segmentation-worm-infection.yaml ├── vr-004-full-kill-chain-phobos-ransomware.yaml ├── vr-005-log4j-log4shell-rce.yaml ├── vr-006-vpnfilter-iot-scada-attack.yaml ├── vr-007-hp-audio-driver-keylogger-cve-2017-8360.yaml ├── vr-008-arris-modem-vendor-backdoor.yaml ├── vr-009-juniper-vpn-backdoor.yaml ├── vr-010-baidu-sdk-wormhole-backdoor.yaml ├── vr-011-mobisage-sdk-ibackdoor.yaml ├── vr-012-f5-bigip-hardcoded-ssh-key.yaml ├── vr-013-yinhun-mbr-bootkit.yaml ├── vr-014-oa-hybrid-attack-rdp-filewrite.yaml ├── vr-015-upload-vuln-to-mining-worm.yaml ├── vr-016-malicious-link-to-internal-worm.yaml ├── vr-017-security-posture-collapse-mass-infection.yaml └── vr-018-tmobile-sim-swap-mfa-bypass.yaml └── WA ├── wa-001-sql_injection_attack.yaml ├── wa-002-freemarker_template_injection.yaml ├── wa-003-python_unpickle_deserialization.yaml ├── wa-004-reverse_shell_attack.yaml └── wa-005-sql-injection-post-exploitation.yaml /LICENSE: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/deepsec-top/deepsec/HEAD/LICENSE -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/deepsec-top/deepsec/HEAD/README.md -------------------------------------------------------------------------------- /raw_corpus/APT/apt-001-olympic-destroyer.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/deepsec-top/deepsec/HEAD/raw_corpus/APT/apt-001-olympic-destroyer.yaml -------------------------------------------------------------------------------- /raw_corpus/APT/apt-002-bluemushroom.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/deepsec-top/deepsec/HEAD/raw_corpus/APT/apt-002-bluemushroom.yaml -------------------------------------------------------------------------------- /raw_corpus/APT/apt-003-oceanlotus.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/deepsec-top/deepsec/HEAD/raw_corpus/APT/apt-003-oceanlotus.yaml -------------------------------------------------------------------------------- /raw_corpus/APT/apt-004-bitter.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/deepsec-top/deepsec/HEAD/raw_corpus/APT/apt-004-bitter.yaml -------------------------------------------------------------------------------- /raw_corpus/APT/apt-005-apt38-lazarus.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/deepsec-top/deepsec/HEAD/raw_corpus/APT/apt-005-apt38-lazarus.yaml -------------------------------------------------------------------------------- /raw_corpus/APT/apt-006-operation-aurora.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/deepsec-top/deepsec/HEAD/raw_corpus/APT/apt-006-operation-aurora.yaml -------------------------------------------------------------------------------- /raw_corpus/APT/apt-007-night-dragon.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/deepsec-top/deepsec/HEAD/raw_corpus/APT/apt-007-night-dragon.yaml -------------------------------------------------------------------------------- /raw_corpus/APT/apt-008-shady-rat.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/deepsec-top/deepsec/HEAD/raw_corpus/APT/apt-008-shady-rat.yaml -------------------------------------------------------------------------------- /raw_corpus/APT/apt-009-nitro-attack.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/deepsec-top/deepsec/HEAD/raw_corpus/APT/apt-009-nitro-attack.yaml -------------------------------------------------------------------------------- /raw_corpus/APT/apt-010-apt28-uefi.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/deepsec-top/deepsec/HEAD/raw_corpus/APT/apt-010-apt28-uefi.yaml -------------------------------------------------------------------------------- /raw_corpus/APT/apt-011-darkhotel.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/deepsec-top/deepsec/HEAD/raw_corpus/APT/apt-011-darkhotel.yaml -------------------------------------------------------------------------------- /raw_corpus/APT/apt-012-slingshot.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/deepsec-top/deepsec/HEAD/raw_corpus/APT/apt-012-slingshot.yaml -------------------------------------------------------------------------------- /raw_corpus/APT/apt-013-stuxnet.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/deepsec-top/deepsec/HEAD/raw_corpus/APT/apt-013-stuxnet.yaml -------------------------------------------------------------------------------- /raw_corpus/BT/bt-003-webshell_upload_memory_shell.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/deepsec-top/deepsec/HEAD/raw_corpus/BT/bt-003-webshell_upload_memory_shell.yaml -------------------------------------------------------------------------------- /raw_corpus/BT/bt-004-cobaltstrike_beacon_http.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/deepsec-top/deepsec/HEAD/raw_corpus/BT/bt-004-cobaltstrike_beacon_http.yaml -------------------------------------------------------------------------------- /raw_corpus/BT/bt-005-webshell_behinder_4_0.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/deepsec-top/deepsec/HEAD/raw_corpus/BT/bt-005-webshell_behinder_4_0.yaml -------------------------------------------------------------------------------- /raw_corpus/CM/cm-001-azure-blob-misconfiguration.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/deepsec-top/deepsec/HEAD/raw_corpus/CM/cm-001-azure-blob-misconfiguration.yaml -------------------------------------------------------------------------------- /raw_corpus/CM/cm-002-azure-sas-token-misconfiguration.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/deepsec-top/deepsec/HEAD/raw_corpus/CM/cm-002-azure-sas-token-misconfiguration.yaml -------------------------------------------------------------------------------- /raw_corpus/DDoS/ddos-001-hybrid-http-range-attack.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/deepsec-top/deepsec/HEAD/raw_corpus/DDoS/ddos-001-hybrid-http-range-attack.yaml -------------------------------------------------------------------------------- /raw_corpus/DDoS/ddos-002-ntp-reflection-rddos-attack.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/deepsec-top/deepsec/HEAD/raw_corpus/DDoS/ddos-002-ntp-reflection-rddos-attack.yaml -------------------------------------------------------------------------------- /raw_corpus/DS/ds-001-oracle-apt-defense-success.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/deepsec-top/deepsec/HEAD/raw_corpus/DS/ds-001-oracle-apt-defense-success.yaml -------------------------------------------------------------------------------- /raw_corpus/FA/fa-001-phishing-email-sage-2-2-infection.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/deepsec-top/deepsec/HEAD/raw_corpus/FA/fa-001-phishing-email-sage-2-2-infection.yaml -------------------------------------------------------------------------------- /raw_corpus/FA/fa-002-tmobile-sim-swap-mfa-bypass.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/deepsec-top/deepsec/HEAD/raw_corpus/FA/fa-002-tmobile-sim-swap-mfa-bypass.yaml -------------------------------------------------------------------------------- /raw_corpus/HT/ht-002-smbexec_remote_execution.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/deepsec-top/deepsec/HEAD/raw_corpus/HT/ht-002-smbexec_remote_execution.yaml -------------------------------------------------------------------------------- /raw_corpus/HT/ht-003-pystinger_tunnel_communication.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/deepsec-top/deepsec/HEAD/raw_corpus/HT/ht-003-pystinger_tunnel_communication.yaml -------------------------------------------------------------------------------- /raw_corpus/HT/ht-004-metasploit_payload_transmission.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/deepsec-top/deepsec/HEAD/raw_corpus/HT/ht-004-metasploit_payload_transmission.yaml -------------------------------------------------------------------------------- /raw_corpus/HT/ht-005-neo_regeorg_tunnel_communication.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/deepsec-top/deepsec/HEAD/raw_corpus/HT/ht-005-neo_regeorg_tunnel_communication.yaml -------------------------------------------------------------------------------- /raw_corpus/IL/IL-002-web_root_directory_information_leakage.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/deepsec-top/deepsec/HEAD/raw_corpus/IL/IL-002-web_root_directory_information_leakage.yaml -------------------------------------------------------------------------------- /raw_corpus/IL/il-001-github_sensitive_information_leakage.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/deepsec-top/deepsec/HEAD/raw_corpus/IL/il-001-github_sensitive_information_leakage.yaml -------------------------------------------------------------------------------- /raw_corpus/IT/it-001-twitter-insider-account-hijack.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/deepsec-top/deepsec/HEAD/raw_corpus/IT/it-001-twitter-insider-account-hijack.yaml -------------------------------------------------------------------------------- /raw_corpus/IT/it-002-ex-employee-revenge-sabotage.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/deepsec-top/deepsec/HEAD/raw_corpus/IT/it-002-ex-employee-revenge-sabotage.yaml -------------------------------------------------------------------------------- /raw_corpus/IT/it-003-rdp-lateral-movement.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/deepsec-top/deepsec/HEAD/raw_corpus/IT/it-003-rdp-lateral-movement.yaml -------------------------------------------------------------------------------- /raw_corpus/IT/it-004-internal-ipc-bruteforce.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/deepsec-top/deepsec/HEAD/raw_corpus/IT/it-004-internal-ipc-bruteforce.yaml -------------------------------------------------------------------------------- /raw_corpus/IT/it-005-cracked-software-spread.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/deepsec-top/deepsec/HEAD/raw_corpus/IT/it-005-cracked-software-spread.yaml -------------------------------------------------------------------------------- /raw_corpus/IT/it-006-unauthorized-port-forwarding.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/deepsec-top/deepsec/HEAD/raw_corpus/IT/it-006-unauthorized-port-forwarding.yaml -------------------------------------------------------------------------------- /raw_corpus/IT/it-007-multi-hop-rdp.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/deepsec-top/deepsec/HEAD/raw_corpus/IT/it-007-multi-hop-rdp.yaml -------------------------------------------------------------------------------- /raw_corpus/IT/it-008-ssh-key-theft-ansible.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/deepsec-top/deepsec/HEAD/raw_corpus/IT/it-008-ssh-key-theft-ansible.yaml -------------------------------------------------------------------------------- /raw_corpus/IT/it-009-usb-internal-spread.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/deepsec-top/deepsec/HEAD/raw_corpus/IT/it-009-usb-internal-spread.yaml -------------------------------------------------------------------------------- /raw_corpus/IT/it-010-incident-response-failure-log-loss.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/deepsec-top/deepsec/HEAD/raw_corpus/IT/it-010-incident-response-failure-log-loss.yaml -------------------------------------------------------------------------------- /raw_corpus/MC/mc-001-mining_trojan_communication.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/deepsec-top/deepsec/HEAD/raw_corpus/MC/mc-001-mining_trojan_communication.yaml -------------------------------------------------------------------------------- /raw_corpus/MC/mc-002-outlaw-botnet-mining-ddos.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/deepsec-top/deepsec/HEAD/raw_corpus/MC/mc-002-outlaw-botnet-mining-ddos.yaml -------------------------------------------------------------------------------- /raw_corpus/MC/mc-003-tor2mine-powershell-mimikatz.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/deepsec-top/deepsec/HEAD/raw_corpus/MC/mc-003-tor2mine-powershell-mimikatz.yaml -------------------------------------------------------------------------------- /raw_corpus/MC/mc-004-teamtnt-docker-kubernetes-attack.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/deepsec-top/deepsec/HEAD/raw_corpus/MC/mc-004-teamtnt-docker-kubernetes-attack.yaml -------------------------------------------------------------------------------- /raw_corpus/MC/mc-005-h2miner-multi-vulnerability-attack.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/deepsec-top/deepsec/HEAD/raw_corpus/MC/mc-005-h2miner-multi-vulnerability-attack.yaml -------------------------------------------------------------------------------- /raw_corpus/MC/mc-006-sysrv-hello-web-infection-spread.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/deepsec-top/deepsec/HEAD/raw_corpus/MC/mc-006-sysrv-hello-web-infection-spread.yaml -------------------------------------------------------------------------------- /raw_corpus/MC/mc-007-cloud-shovel-targeted-bruteforce.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/deepsec-top/deepsec/HEAD/raw_corpus/MC/mc-007-cloud-shovel-targeted-bruteforce.yaml -------------------------------------------------------------------------------- /raw_corpus/README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/deepsec-top/deepsec/HEAD/raw_corpus/README.md -------------------------------------------------------------------------------- /raw_corpus/SC/sc-001-rsa-securid-theft-apt.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/deepsec-top/deepsec/HEAD/raw_corpus/SC/sc-001-rsa-securid-theft-apt.yaml -------------------------------------------------------------------------------- /raw_corpus/SC/sc-002-solarwinds-supply-chain-sunburst.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/deepsec-top/deepsec/HEAD/raw_corpus/SC/sc-002-solarwinds-supply-chain-sunburst.yaml -------------------------------------------------------------------------------- /raw_corpus/SC/sc-003-kaseya-vsa-supply-chain-revil-ransomware.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/deepsec-top/deepsec/HEAD/raw_corpus/SC/sc-003-kaseya-vsa-supply-chain-revil-ransomware.yaml -------------------------------------------------------------------------------- /raw_corpus/SC/sc-004-ccleaner-supply-chain-staged-payload.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/deepsec-top/deepsec/HEAD/raw_corpus/SC/sc-004-ccleaner-supply-chain-staged-payload.yaml -------------------------------------------------------------------------------- /raw_corpus/SC/sc-005-3cx-supply-chain-dll-sideloading.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/deepsec-top/deepsec/HEAD/raw_corpus/SC/sc-005-3cx-supply-chain-dll-sideloading.yaml -------------------------------------------------------------------------------- /raw_corpus/SC/sc-006-asus-live-update-shadowhammer.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/deepsec-top/deepsec/HEAD/raw_corpus/SC/sc-006-asus-live-update-shadowhammer.yaml -------------------------------------------------------------------------------- /raw_corpus/SC/sc-007-codecov-supply-chain-cicd.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/deepsec-top/deepsec/HEAD/raw_corpus/SC/sc-007-codecov-supply-chain-cicd.yaml -------------------------------------------------------------------------------- /raw_corpus/SC/sc-008-xcodeghost-supply-chain.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/deepsec-top/deepsec/HEAD/raw_corpus/SC/sc-008-xcodeghost-supply-chain.yaml -------------------------------------------------------------------------------- /raw_corpus/SC/sc-009-xz-utils-supply-chain-backdoor.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/deepsec-top/deepsec/HEAD/raw_corpus/SC/sc-009-xz-utils-supply-chain-backdoor.yaml -------------------------------------------------------------------------------- /raw_corpus/SC/sc-010-npm-ua-parser-js-supply-chain.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/deepsec-top/deepsec/HEAD/raw_corpus/SC/sc-010-npm-ua-parser-js-supply-chain.yaml -------------------------------------------------------------------------------- /raw_corpus/SC/sc-011-wordpress-plugin-backdoor.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/deepsec-top/deepsec/HEAD/raw_corpus/SC/sc-011-wordpress-plugin-backdoor.yaml -------------------------------------------------------------------------------- /raw_corpus/SC/sc-012-unicode-trojan-source.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/deepsec-top/deepsec/HEAD/raw_corpus/SC/sc-012-unicode-trojan-source.yaml -------------------------------------------------------------------------------- /raw_corpus/SC/sc-013-chrome-extension-oauth-hijack.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/deepsec-top/deepsec/HEAD/raw_corpus/SC/sc-013-chrome-extension-oauth-hijack.yaml -------------------------------------------------------------------------------- /raw_corpus/SC/sc-014-pypi-typosquatting-attack.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/deepsec-top/deepsec/HEAD/raw_corpus/SC/sc-014-pypi-typosquatting-attack.yaml -------------------------------------------------------------------------------- /raw_corpus/SC/sc-015-xshell-backdoor-supply-chain.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/deepsec-top/deepsec/HEAD/raw_corpus/SC/sc-015-xshell-backdoor-supply-chain.yaml -------------------------------------------------------------------------------- /raw_corpus/SC/sc-016-wirex-android-botnet-google-play.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/deepsec-top/deepsec/HEAD/raw_corpus/SC/sc-016-wirex-android-botnet-google-play.yaml -------------------------------------------------------------------------------- /raw_corpus/SC/sc-017-fake-laomaotao-pe-tool.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/deepsec-top/deepsec/HEAD/raw_corpus/SC/sc-017-fake-laomaotao-pe-tool.yaml -------------------------------------------------------------------------------- /raw_corpus/SC/sc-018-putty-cn-backdoor.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/deepsec-top/deepsec/HEAD/raw_corpus/SC/sc-018-putty-cn-backdoor.yaml -------------------------------------------------------------------------------- /raw_corpus/SC/sc-019-kuzzle-malware-stolen-signature.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/deepsec-top/deepsec/HEAD/raw_corpus/SC/sc-019-kuzzle-malware-stolen-signature.yaml -------------------------------------------------------------------------------- /raw_corpus/SC/sc-020-isp-update-hijacking.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/deepsec-top/deepsec/HEAD/raw_corpus/SC/sc-020-isp-update-hijacking.yaml -------------------------------------------------------------------------------- /raw_corpus/SC/sc-021-havex-ics-supply-chain-attack.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/deepsec-top/deepsec/HEAD/raw_corpus/SC/sc-021-havex-ics-supply-chain-attack.yaml -------------------------------------------------------------------------------- /raw_corpus/VR/vr-001-exchange_proxylogon_cve_2021_27065.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/deepsec-top/deepsec/HEAD/raw_corpus/VR/vr-001-exchange_proxylogon_cve_2021_27065.yaml -------------------------------------------------------------------------------- /raw_corpus/VR/vr-002-ms17-010-ransomware-infection.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/deepsec-top/deepsec/HEAD/raw_corpus/VR/vr-002-ms17-010-ransomware-infection.yaml -------------------------------------------------------------------------------- /raw_corpus/VR/vr-003-ics-it-ot-segmentation-worm-infection.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/deepsec-top/deepsec/HEAD/raw_corpus/VR/vr-003-ics-it-ot-segmentation-worm-infection.yaml -------------------------------------------------------------------------------- /raw_corpus/VR/vr-004-full-kill-chain-phobos-ransomware.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/deepsec-top/deepsec/HEAD/raw_corpus/VR/vr-004-full-kill-chain-phobos-ransomware.yaml -------------------------------------------------------------------------------- /raw_corpus/VR/vr-005-log4j-log4shell-rce.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/deepsec-top/deepsec/HEAD/raw_corpus/VR/vr-005-log4j-log4shell-rce.yaml -------------------------------------------------------------------------------- /raw_corpus/VR/vr-006-vpnfilter-iot-scada-attack.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/deepsec-top/deepsec/HEAD/raw_corpus/VR/vr-006-vpnfilter-iot-scada-attack.yaml -------------------------------------------------------------------------------- /raw_corpus/VR/vr-007-hp-audio-driver-keylogger-cve-2017-8360.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/deepsec-top/deepsec/HEAD/raw_corpus/VR/vr-007-hp-audio-driver-keylogger-cve-2017-8360.yaml -------------------------------------------------------------------------------- /raw_corpus/VR/vr-008-arris-modem-vendor-backdoor.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/deepsec-top/deepsec/HEAD/raw_corpus/VR/vr-008-arris-modem-vendor-backdoor.yaml -------------------------------------------------------------------------------- /raw_corpus/VR/vr-009-juniper-vpn-backdoor.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/deepsec-top/deepsec/HEAD/raw_corpus/VR/vr-009-juniper-vpn-backdoor.yaml -------------------------------------------------------------------------------- /raw_corpus/VR/vr-010-baidu-sdk-wormhole-backdoor.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/deepsec-top/deepsec/HEAD/raw_corpus/VR/vr-010-baidu-sdk-wormhole-backdoor.yaml -------------------------------------------------------------------------------- /raw_corpus/VR/vr-011-mobisage-sdk-ibackdoor.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/deepsec-top/deepsec/HEAD/raw_corpus/VR/vr-011-mobisage-sdk-ibackdoor.yaml -------------------------------------------------------------------------------- /raw_corpus/VR/vr-012-f5-bigip-hardcoded-ssh-key.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/deepsec-top/deepsec/HEAD/raw_corpus/VR/vr-012-f5-bigip-hardcoded-ssh-key.yaml -------------------------------------------------------------------------------- /raw_corpus/VR/vr-013-yinhun-mbr-bootkit.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/deepsec-top/deepsec/HEAD/raw_corpus/VR/vr-013-yinhun-mbr-bootkit.yaml -------------------------------------------------------------------------------- /raw_corpus/VR/vr-014-oa-hybrid-attack-rdp-filewrite.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/deepsec-top/deepsec/HEAD/raw_corpus/VR/vr-014-oa-hybrid-attack-rdp-filewrite.yaml -------------------------------------------------------------------------------- /raw_corpus/VR/vr-015-upload-vuln-to-mining-worm.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/deepsec-top/deepsec/HEAD/raw_corpus/VR/vr-015-upload-vuln-to-mining-worm.yaml -------------------------------------------------------------------------------- /raw_corpus/VR/vr-016-malicious-link-to-internal-worm.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/deepsec-top/deepsec/HEAD/raw_corpus/VR/vr-016-malicious-link-to-internal-worm.yaml -------------------------------------------------------------------------------- /raw_corpus/VR/vr-017-security-posture-collapse-mass-infection.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/deepsec-top/deepsec/HEAD/raw_corpus/VR/vr-017-security-posture-collapse-mass-infection.yaml -------------------------------------------------------------------------------- /raw_corpus/VR/vr-018-tmobile-sim-swap-mfa-bypass.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/deepsec-top/deepsec/HEAD/raw_corpus/VR/vr-018-tmobile-sim-swap-mfa-bypass.yaml -------------------------------------------------------------------------------- /raw_corpus/WA/wa-001-sql_injection_attack.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/deepsec-top/deepsec/HEAD/raw_corpus/WA/wa-001-sql_injection_attack.yaml -------------------------------------------------------------------------------- /raw_corpus/WA/wa-002-freemarker_template_injection.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/deepsec-top/deepsec/HEAD/raw_corpus/WA/wa-002-freemarker_template_injection.yaml -------------------------------------------------------------------------------- /raw_corpus/WA/wa-003-python_unpickle_deserialization.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/deepsec-top/deepsec/HEAD/raw_corpus/WA/wa-003-python_unpickle_deserialization.yaml -------------------------------------------------------------------------------- /raw_corpus/WA/wa-004-reverse_shell_attack.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/deepsec-top/deepsec/HEAD/raw_corpus/WA/wa-004-reverse_shell_attack.yaml -------------------------------------------------------------------------------- /raw_corpus/WA/wa-005-sql-injection-post-exploitation.yaml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/deepsec-top/deepsec/HEAD/raw_corpus/WA/wa-005-sql-injection-post-exploitation.yaml --------------------------------------------------------------------------------