6r3g / ATTACKmdLinks
Mitre ATT&CK framework tactics and techniques in markdown format for best use in Obsidian
β18Updated last year
Alternatives and similar repositories for ATTACKmd
Users that are interested in ATTACKmd are comparing it to the libraries listed below
Sorting:
- π‘οΈ VIPER: Stay ahead of threats with AI-driven vulnerability intelligence. Prioritize CVEs effectively using NVD, EPSS, CISA KEV, and Goβ¦β81Updated 4 months ago
- Signature based honeypot detector tool written in Golangβ107Updated 9 months ago
- Domain Response is a tool that is designed to help you automate the investigation for a domain. This tool is specificly designed to automβ¦β50Updated last week
- MS Graph Commands and Tools for Blue Teamersβ52Updated 2 years ago
- DShield Sensor Log Collection with ELKβ46Updated last week
- This project is an Ansible Role to execute Atomic Red Team tests against multiple machines by wrapping Invoke-AtomicRedTeamβ27Updated last year
- β101Updated last month
- The Eventlog Compendium is the go-to resource for understanding Windows Event Logs.β51Updated 8 months ago
- TTPMapper is an AI-driven threat intelligence parser that converts unstructured reports whether from web URLs or PDF files into structureβ¦β48Updated 6 months ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so onβ84Updated last year
- β74Updated this week
- A simple tool designed to create Atomic Red Team tests with ease.β49Updated 10 months ago
- π»ββοΈ πΉ Threat hunting with Polars and flaws.cloud AWS CloudTrail datasets.β14Updated last year
- Finding ClickFix and FakeCAPTCHA like it's 1999β120Updated this week
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analyβ¦β31Updated last year
- β50Updated this week
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.β53Updated last year
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data wβ¦β54Updated last year
- Online resources related to Detection Engineering. Detection rules, detection logic, attack samples, detection tests and emulation toolsβ¦β137Updated last month
- Passive OS detection based on SYN packets without Transmitting any Dataβ48Updated 2 years ago
- Explore the GOAD Active Directory lab in 5 minutes with Adalancheβ42Updated last year
- An index of publicly available and open-source threat detection rulesets.β131Updated 8 months ago
- Convert Sigma rules to SIEM queries, directly in your browser.β107Updated 3 weeks ago
- Rebuild of portspoof in GO with additional features.β26Updated 2 months ago
- This is a repository to experiment with MCP for securityβ45Updated 11 months ago
- SECurityTr8Ker monitors the SEC's RSS feed for 8-K filings with cybersecurity incident disclosures.β90Updated 6 months ago
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidentsβ49Updated last year
- VelociraptorMCP is a Model Context Protocol bridge for exposing LLMs to MCP clients.β67Updated 4 months ago
- Scripts to check for security issues with SSH keys and authorized_keys files on Linux and other Unix-like operating systems.β23Updated 3 months ago
- Repository that contains a set of purposefully erroneous Yara rules.β61Updated 5 months ago