A public repository of MITRE ATT&ACK TTP mappings by BushidoUK for OSINT reports that lack a section breaking down the TTPs.
☆26Mar 20, 2025Updated last year
Alternatives and similar repositories for MITRE-Mappings
Users that are interested in MITRE-Mappings are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆14Dec 5, 2024Updated last year
- A collection of CVEs weaponized by ransomware operators☆129Oct 13, 2025Updated 5 months ago
- simple C# portscanner - written for playing around with Metasploit's Execute-Assembly☆10Jul 1, 2023Updated 2 years ago
- a tiny program to consume from ETW providers for research☆55Jan 4, 2025Updated last year
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆60Oct 28, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ☆18Updated this week
- yaa - yaml search for humans☆12Dec 8, 2025Updated 4 months ago
- Indicators of compromise☆17Jan 29, 2026Updated 2 months ago
- An ultra lightweight web screenshot tool with advanced DOM analysis features.☆41Apr 1, 2026Updated last week
- A list of books suggested by the security community to aid intelligence analysts learn to think☆28Aug 7, 2023Updated 2 years ago
- Can you pay the ransom in your country?☆14Dec 18, 2023Updated 2 years ago
- ☆21Jan 8, 2026Updated 3 months ago
- Python based tool for generating Shellcode from PIC C☆43Nov 6, 2025Updated 5 months ago
- A catalog of services that can be publicly exposed within different cloud providers.☆14Aug 30, 2024Updated last year
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Pre-Auth Exploit for CVE-2024-40711☆55Sep 15, 2024Updated last year
- A python package that helps with analysis of MSI files☆14Mar 28, 2021Updated 5 years ago
- This is a repository for the public blog with Labs indicators of compromise and code☆18Jan 8, 2020Updated 6 years ago
- This exploit is utilising AddressOfEntryPoint of process which is RX and using WriteProcessMemory internal magic to change the permission…☆18Oct 31, 2024Updated last year
- Just Another broken Registry Parser (JARP)☆16May 23, 2024Updated last year
- Rolling Timeline for Incident Recorder.☆14Dec 4, 2023Updated 2 years ago
- A simple POC to expose Mythic as a MCP server☆73Mar 20, 2025Updated last year
- ☆11Dec 9, 2025Updated 4 months ago
- List of custom developed KQL queries to help proactive security teams hunt for opportunistic and sophisticated threat activity by develop…☆26Jun 30, 2021Updated 4 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Track progress and keep notes while working through likethecoins' CTI Self Study Plan☆29Aug 25, 2022Updated 3 years ago
- TIM is a Kusto investigation platform that enables a user to quickly pivot between data sources; annotate their findings; and promotes co…☆23Aug 7, 2024Updated last year
- 🐻❄️ 🏹 Threat hunting with Polars and flaws.cloud AWS CloudTrail datasets.☆14May 22, 2024Updated last year
- This project provides a set of Google Apps Scripts designed to help you identify and analyze potentially malicious domains directly from …☆14Sep 4, 2024Updated last year
- Basic network sec tool for real-time threat detection and C2 communication prevention. Features 70+ detection modules, IOC integration, c…☆17Jun 11, 2024Updated last year
- Turn any blog into structured threat intelligence.☆55Updated this week
- Discord C2 Profile for Mythic☆33Feb 18, 2025Updated last year
- Ansible build for Afl++ Frida-Mode☆25Jun 8, 2024Updated last year
- A first look at browser-based Cryptojacking☆16Jun 7, 2018Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Framework to reverse engineer binaries and evaluate similarities across a large collections of files. Uses sector hashing and data flow …☆15May 23, 2023Updated 2 years ago
- Yet Another LinkedIn Scraper☆32Mar 9, 2023Updated 3 years ago
- Project based on RegRipper, to extract add'l value/pivot points from TLN events file☆89Feb 9, 2025Updated last year
- create a "simulated internet" cyber range environment☆18Mar 31, 2026Updated last week
- Single Python Project enabling quick infrastructure loading (SMB Servers, HTTP File Server, FTP, Webpage, NetScanner)☆12Jan 15, 2024Updated 2 years ago
- ☆56Updated this week
- 7 days of Red Teaming TTPs that your favorite tools may use to acheive a post exploitation goal☆18Apr 17, 2021Updated 4 years ago