A public repository of MITRE ATT&ACK TTP mappings by BushidoUK for OSINT reports that lack a section breaking down the TTPs.
☆27Mar 20, 2025Updated 11 months ago
Alternatives and similar repositories for MITRE-Mappings
Users that are interested in MITRE-Mappings are comparing it to the libraries listed below
Sorting:
- ☆12Jun 1, 2024Updated last year
- simple C# portscanner - written for playing around with Metasploit's Execute-Assembly☆10Jul 1, 2023Updated 2 years ago
- ☆11Dec 9, 2025Updated 2 months ago
- a tiny program to consume from ETW providers for research☆54Jan 4, 2025Updated last year
- ☆21Jan 8, 2026Updated last month
- A first look at browser-based Cryptojacking☆16Jun 7, 2018Updated 7 years ago
- A tool to assist DLL hijacking via the Havoc GUI☆12Jan 9, 2024Updated 2 years ago
- Direct syscalls Injection to bypass AV/EDR☆12May 18, 2024Updated last year
- 🐻❄️ 🏹 Threat hunting with Polars and flaws.cloud AWS CloudTrail datasets.☆14May 22, 2024Updated last year
- yaa - yaml search for humans☆12Dec 8, 2025Updated 2 months ago
- This exploit is utilising AddressOfEntryPoint of process which is RX and using WriteProcessMemory internal magic to change the permission…☆18Oct 31, 2024Updated last year
- Pre-Auth Exploit for CVE-2024-40711☆55Sep 15, 2024Updated last year
- Discord C2 Profile for Mythic☆33Feb 18, 2025Updated last year
- Single Python Project enabling quick infrastructure loading (SMB Servers, HTTP File Server, FTP, Webpage, NetScanner)☆13Jan 15, 2024Updated 2 years ago
- A catalog of services that can be publicly exposed within different cloud providers.☆14Aug 30, 2024Updated last year
- Framework to reverse engineer binaries and evaluate similarities across a large collections of files. Uses sector hashing and data flow …☆15May 23, 2023Updated 2 years ago
- Basic network sec tool for real-time threat detection and C2 communication prevention. Features 70+ detection modules, IOC integration, c…☆17Jun 11, 2024Updated last year
- Can you pay the ransom in your country?☆14Dec 18, 2023Updated 2 years ago
- An Ubuntu 18.04 box for Mythic C2 framework development☆17Jun 17, 2022Updated 3 years ago
- Templates for developing your own listeners and agents for AdaptixC2.☆45Updated this week
- Scripts and outputs for ATLAS data in STIX JSON and ATT&CK Navigator layer formats☆23Feb 6, 2026Updated 3 weeks ago
- Red Teaming Tactics and Techniques☆13Feb 10, 2022Updated 4 years ago
- Yet Another LinkedIn Scraper☆33Mar 9, 2023Updated 2 years ago
- GitHub CVE Repository Hunt☆18Jul 23, 2024Updated last year
- Indicators of compromise☆17Jan 29, 2026Updated last month
- ☆14Dec 5, 2024Updated last year
- A python package that helps with analysis of MSI files☆14Mar 28, 2021Updated 4 years ago
- Cybersecurity Security Operations Center (SOC) Analyst NOW, by EC-Council☆41Apr 13, 2023Updated 2 years ago
- A standalone tool for logging shell commands to GhostWriter automatically☆19Aug 24, 2024Updated last year
- ☆54Feb 2, 2026Updated last month
- create a "simulated internet" cyber range environment☆19Jan 28, 2026Updated last month
- PHP Phishing Framework☆28Dec 28, 2013Updated 12 years ago
- Invictus Threat Intelligence: IOCs and TTPs from blogs, research and more☆30Nov 26, 2025Updated 3 months ago
- An offensive security framework for writing payloads☆18Sep 13, 2022Updated 3 years ago
- A collection of shell code conversion scripts that I have written over time for repetitive tasks☆19Jul 6, 2019Updated 6 years ago
- "D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system c…☆28Sep 18, 2024Updated last year
- Mythic C2 wrapper for NimSyscallPacker☆25Mar 12, 2025Updated 11 months ago
- Project based on RegRipper, to extract add'l value/pivot points from TLN events file☆89Feb 9, 2025Updated last year
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆57Oct 10, 2022Updated 3 years ago