6r3g / ATTACKmd
Mitre ATT&CK framework tactics and techniques in markdown format for best use in Obsidian
☆16Updated 6 months ago
Alternatives and similar repositories for ATTACKmd:
Users that are interested in ATTACKmd are comparing it to the libraries listed below
- Grabs data from IVRE and brings it into Obsidian notes☆31Updated this week
- Threat Simulator for Enterprise Networks☆14Updated 2 years ago
- Repository that contains a set of purposefully erroneous Yara rules.☆49Updated last year
- Collection of videos of Raids on Cybercriminals☆18Updated 4 months ago
- Osquery Packs we use for customer security hardening☆12Updated 4 months ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆51Updated 2 months ago
- Lua plugin to extract data from Wireshark and convert it into MISP format☆47Updated last year
- A few quick recipes for those that do not have much time during the day☆22Updated 3 months ago
- Send High & New Incidents to The Hive incident management Platform☆18Updated 4 years ago
- Open-source Fabric templates for cybersecurity and compliance☆15Updated last month
- This project is an Ansible Role to execute Atomic Red Team tests against multiple machines by wrapping Invoke-AtomicRedTeam☆25Updated 7 months ago
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆18Updated last year
- Practical Information Sharing between Law Enforcement and CSIRT communities using MISP☆31Updated last year
- The Enhanced MITRE ATT&CK® Coverage Tracker is an Excel tool for SOCs to measure and improve detection coverage of cyber threats. It simp…☆16Updated last month
- This script enhances endpoint logging telemetry for the purpose of advanced malware threat detection or for building detections or malwar…☆24Updated last week
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆38Updated 9 months ago
- Bloodhound Portable for Windows☆51Updated last year
- DNS Dashboard for hunting and identifying beaconing☆14Updated 4 years ago
- ☆15Updated 3 years ago
- Offensive Research Guide to Help Defense Improve Detection☆30Updated 2 years ago
- Automatic detection engineering technical state compliance☆54Updated 7 months ago
- A MITRE ATT&CK Lookup Tool☆45Updated 9 months ago
- ☆11Updated 4 years ago
- Sharing Threat Hunting runbooks☆25Updated 5 years ago
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆59Updated 7 months ago
- The EPSS Calculator is a user-friendly web application that calculates the EPSS (Exploit Prediction Scoring System) score based on a prov…☆11Updated 3 months ago
- Chapter 9: Disseminate☆14Updated 7 years ago
- Track progress and keep notes while working through likethecoins' CTI Self Study Plan☆28Updated 2 years ago
- PowerShell 'Hero': scripts for DFIR and automation with a PowerShell menu example.☆36Updated last year
- Provides an overview of the inner file structure of a PDF☆25Updated 2 years ago