6r3g / ATTACKmdLinks
Mitre ATT&CK framework tactics and techniques in markdown format for best use in Obsidian
β18Updated last year
Alternatives and similar repositories for ATTACKmd
Users that are interested in ATTACKmd are comparing it to the libraries listed below
Sorting:
- π‘οΈ VIPER: Stay ahead of threats with AI-driven vulnerability intelligence. Prioritize CVEs effectively using NVD, EPSS, CISA KEV, and Goβ¦β78Updated last month
- Domain Response is a tool that is designed to help you automate the investigation for a domain. This tool is specificly designed to automβ¦β49Updated 3 weeks ago
- This script enhances endpoint logging telemetry for the purpose of advanced malware threat detection or for building detections or malwarβ¦β33Updated 5 months ago
- MS Graph Commands and Tools for Blue Teamersβ50Updated last year
- Signature based honeypot detector tool written in Golangβ104Updated 6 months ago
- Sigma detection rules for hunting with the threathunting-keywords projectβ56Updated 6 months ago
- β96Updated last month
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data wβ¦β54Updated 9 months ago
- Threat Simulator for Enterprise Networksβ14Updated 3 years ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so onβ83Updated last year
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders undβ¦β125Updated last year
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.β62Updated last year
- This project is an Ansible Role to execute Atomic Red Team tests against multiple machines by wrapping Invoke-AtomicRedTeamβ27Updated last year
- Intel Retrieval Augmented Generation (RAG) Utilitiesβ90Updated last year
- Collection of Remote Management Monitoring tool artifacts, for assisting forensics and investigationsβ95Updated last month
- Finding ClickFix and FakeCAPTCHA like it's 1999β61Updated this week
- A home for detection content developed by the delivr.to teamβ70Updated last month
- Convert Sigma rules to SIEM queries, directly in your browser.β96Updated this week
- Explore the GOAD Active Directory lab in 5 minutes with Adalancheβ38Updated 8 months ago
- CarbonBlack EDR detection rules and response actionsβ71Updated last year
- Placeholder for my detection repo and misc detection engineering contentβ42Updated last year
- Offensive Research Guide to Help Defense Improve Detectionβ31Updated 2 years ago
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitionersβ107Updated 10 months ago
- Online resources related to Detection Engineering. Detection rules, detection logic, attack samples, detection tests and emulation toolsβ¦β117Updated 3 weeks ago
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.β52Updated 11 months ago
- A pySigma wrapper and langchain toolkit for automatic rule creation/translationβ84Updated 4 months ago
- God Mode Detection Rulesβ134Updated last year
- A list of RMMs designed to be used in automation to build alertsβ113Updated 5 months ago
- A simple tool designed to create Atomic Red Team tests with ease.β46Updated 6 months ago
- DShield Sensor Log Collection with ELKβ40Updated this week