6r3g / ATTACKmdLinks
Mitre ATT&CK framework tactics and techniques in markdown format for best use in Obsidian
☆18Updated 11 months ago
Alternatives and similar repositories for ATTACKmd
Users that are interested in ATTACKmd are comparing it to the libraries listed below
Sorting:
- Grabs data from IVRE and brings it into Obsidian notes☆33Updated this week
- 🛡️ VIPER: Stay ahead of threats with AI-driven vulnerability intelligence. Prioritize CVEs effectively using NVD, EPSS, CISA KEV, and Go…☆63Updated this week
- Signature based honeypot detector tool written in Golang☆98Updated 3 months ago
- IOC Lens is an Obsidian plugin for cyber security note taking.☆20Updated 7 months ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆52Updated 7 months ago
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆44Updated last year
- Domain Response is a tool that is designed to help you automate the investigation for a domain. This tool is specificly designed to autom…☆49Updated last year
- Open-source Fabric templates for cybersecurity and compliance☆21Updated 6 months ago
- This script enhances endpoint logging telemetry for the purpose of advanced malware threat detection or for building detections or malwar…☆31Updated 3 months ago
- MS Graph Commands and Tools for Blue Teamers☆50Updated last year
- Project to Support The Hunter's Framework (THF)☆11Updated last year
- Practical Information Sharing between Law Enforcement and CSIRT communities using MISP☆33Updated last year
- ☆13Updated 4 months ago
- Data from Dark Web Marketplace scraping - Be careful☆40Updated 8 months ago
- Parse MITRE ATT&CK to markdown for Obsidian☆31Updated 2 weeks ago
- Explore the GOAD Active Directory lab in 5 minutes with Adalanche☆38Updated 6 months ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆61Updated 11 months ago
- Lua plugin to extract data from Wireshark and convert it into MISP format☆48Updated last year
- A tool to display Windows Event logs as they happen.☆13Updated last year
- Repository that contains a set of purposefully erroneous Yara rules.☆52Updated last year
- Convert Sigma rules to SIEM queries, directly in your browser.☆91Updated this week
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆82Updated last year
- A repository of curated lists with elements such as IoCs to use for threat hunting & detection queries.☆34Updated 11 months ago
- Repository of tools and resources for analyzing Docker containers☆66Updated last year
- The Enhanced MITRE ATT&CK® Coverage Tracker is an Excel tool for SOCs to measure and improve detection coverage of cyber threats. It simp…☆27Updated 6 months ago
- Online resources related to Detection Engineering. Detection rules, detection logic, attack samples, detection tests and emulation tools…☆104Updated this week
- SECurityTr8Ker monitors the SEC's RSS feed for 8-K filings with cybersecurity incident disclosures.☆77Updated 3 weeks ago
- God Mode Detection Rules☆134Updated 11 months ago
- Automated threat intel feed parsing and consolidation💻👾🤖☆30Updated this week
- A MITRE ATT&CK Lookup Tool☆45Updated last year