A public repository of MITRE ATT&ACK TTP mappings by BushidoUK for OSINT reports that lack a section breaking down the TTPs.
☆27Mar 20, 2025Updated last year
Alternatives and similar repositories for MITRE-Mappings
Users that are interested in MITRE-Mappings are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆14Dec 5, 2024Updated last year
- A collection of CVEs weaponized by ransomware operators☆129Oct 13, 2025Updated 6 months ago
- simple C# portscanner - written for playing around with Metasploit's Execute-Assembly☆10Jul 1, 2023Updated 2 years ago
- a tiny program to consume from ETW providers for research☆56Jan 4, 2025Updated last year
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆60Oct 28, 2022Updated 3 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- yaa - yaml search for humans☆12Dec 8, 2025Updated 4 months ago
- Indicators of compromise☆17Jan 29, 2026Updated 3 months ago
- An ultra lightweight web screenshot tool with advanced DOM analysis features.☆42Apr 1, 2026Updated last month
- Can you pay the ransom in your country?☆14Dec 18, 2023Updated 2 years ago
- Python based tool for generating Shellcode from PIC C☆43Nov 6, 2025Updated 5 months ago
- Pre-Auth Exploit for CVE-2024-40711☆55Sep 15, 2024Updated last year
- A catalog of services that can be publicly exposed within different cloud providers.☆14Aug 30, 2024Updated last year
- A python package that helps with analysis of MSI files☆14Mar 28, 2021Updated 5 years ago
- A tool to assist DLL hijacking via the Havoc GUI☆13Jan 9, 2024Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- This is a repository for the public blog with Labs indicators of compromise and code☆18Jan 8, 2020Updated 6 years ago
- Just Another broken Registry Parser (JARP)☆16May 23, 2024Updated last year
- Rolling Timeline for Incident Recorder.☆14Dec 4, 2023Updated 2 years ago
- A simple POC to expose Mythic as a MCP server☆74Mar 20, 2025Updated last year
- A structured 90-day cybersecurity study plan for beginners (2025). Covers certifications (Network+, Security+), Linux, Python, Wireshark,…☆39Mar 8, 2025Updated last year
- ☆11Dec 9, 2025Updated 4 months ago
- Track progress and keep notes while working through likethecoins' CTI Self Study Plan☆29Aug 25, 2022Updated 3 years ago
- List of custom developed KQL queries to help proactive security teams hunt for opportunistic and sophisticated threat activity by develop…☆26Jun 30, 2021Updated 4 years ago
- TIM is a Kusto investigation platform that enables a user to quickly pivot between data sources; annotate their findings; and promotes co…☆23Aug 7, 2024Updated last year
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- 🐻❄️ 🏹 Threat hunting with Polars and flaws.cloud AWS CloudTrail datasets.☆14May 22, 2024Updated last year
- This project provides a set of Google Apps Scripts designed to help you identify and analyze potentially malicious domains directly from …☆14Sep 4, 2024Updated last year
- Basic network sec tool for real-time threat detection and C2 communication prevention. Features 70+ detection modules, IOC integration, c…☆17Jun 11, 2024Updated last year
- Attack and introduction (info stealer), start your adventure in MMD☆19Sep 14, 2025Updated 7 months ago
- Turn any blog into structured threat intelligence.☆57Apr 22, 2026Updated last week
- Ansible build for Afl++ Frida-Mode☆25Jun 8, 2024Updated last year
- A first look at browser-based Cryptojacking☆16Jun 7, 2018Updated 7 years ago
- Framework to reverse engineer binaries and evaluate similarities across a large collections of files. Uses sector hashing and data flow …☆15May 23, 2023Updated 2 years ago
- Yet Another LinkedIn Scraper☆33Mar 9, 2023Updated 3 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- create a "simulated internet" cyber range environment☆18Mar 31, 2026Updated last month
- Single Python Project enabling quick infrastructure loading (SMB Servers, HTTP File Server, FTP, Webpage, NetScanner)☆13Jan 15, 2024Updated 2 years ago
- ☆57Apr 16, 2026Updated 2 weeks ago
- 7 days of Red Teaming TTPs that your favorite tools may use to acheive a post exploitation goal☆18Apr 17, 2021Updated 5 years ago
- Direct syscalls Injection to bypass AV/EDR☆11May 18, 2024Updated last year
- Automated, aggressive reconnaissance engine for Bug Bounty Hunting and Red Teaming. Features hardware auto-scaling, smart recursion, and …☆18Dec 18, 2025Updated 4 months ago
- A standalone tool for logging shell commands to GhostWriter automatically☆19Aug 24, 2024Updated last year