6r3g / ATTACKmdLinks
Mitre ATT&CK framework tactics and techniques in markdown format for best use in Obsidian
☆18Updated 10 months ago
Alternatives and similar repositories for ATTACKmd
Users that are interested in ATTACKmd are comparing it to the libraries listed below
Sorting:
- A MITRE ATT&CK Lookup Tool☆45Updated last year
- YARA, SIGMA, SNORT Rules based on Malware Analysis☆16Updated 2 months ago
- Open-source Fabric templates for cybersecurity and compliance☆20Updated 5 months ago
- Intelligence around common attacker behaviors (MITRE ATT&CK TTPs), in the form of ATT&CK Navigator "layer" json files.☆35Updated 2 years ago
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆57Updated 3 years ago
- Sharing Threat Hunting runbooks☆26Updated 5 years ago
- Bloodhound Portable for Windows☆51Updated 2 years ago
- Threat Simulator for Enterprise Networks☆14Updated 3 years ago
- Grabs data from IVRE and brings it into Obsidian notes☆33Updated this week
- Data from Dark Web Marketplace scraping - Be careful☆39Updated 7 months ago
- The Enhanced MITRE ATT&CK® Coverage Tracker is an Excel tool for SOCs to measure and improve detection coverage of cyber threats. It simp…☆26Updated 5 months ago
- ☆11Updated 4 years ago
- Powershell Scripts to work on Crowdstrike Falcon that pull back raw data relevant to forensic investigation☆22Updated 6 months ago
- Converting data from services like Censys and Shodan to a common data model☆49Updated 9 months ago
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆44Updated last year
- This project aims to bridge the gap between Microsoft Attack Surface Reduction (ASR) rules and MITRE ATT&CK by mapping ASR rules to their…☆26Updated 7 months ago
- Practical Information Sharing between Law Enforcement and CSIRT communities using MISP☆32Updated last year
- Convert Sigma rules to SIEM queries, directly in your browser.☆89Updated last week
- Send High & New Incidents to The Hive incident management Platform☆18Updated 4 years ago
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆34Updated 2 months ago
- DNS Dashboard for hunting and identifying beaconing☆16Updated 4 years ago
- Jupyter Univere is a search engine for all infosec jupyter notebooks☆26Updated 3 months ago
- ☆13Updated 3 months ago
- 🛡️ VIPER: Stay ahead of threats with AI-driven vulnerability intelligence. Prioritize CVEs effectively using NVD, EPSS, CISA KEV, and Go…☆59Updated this week
- Sigma detection rules for hunting with the threathunting-keywords project☆55Updated 3 months ago
- Library of threat hunts to get any user started!☆44Updated 4 years ago
- TheHiveIRPlaybook is a collection of TheHive case templates used for Incident Response☆13Updated 4 years ago
- Azure Activity Log Axe is a continually developing tool that simplifies the transactional log format provided by Microsoft. The tool leve…☆28Updated 9 months ago
- SigmaHQ pySigma CrowdStrike processing pipeline☆26Updated 8 months ago
- This project is an Ansible Role to execute Atomic Red Team tests against multiple machines by wrapping Invoke-AtomicRedTeam☆27Updated 11 months ago