☆19Jun 16, 2021Updated 4 years ago
Alternatives and similar repositories for Mitre-Attack-Matrix
Users that are interested in Mitre-Attack-Matrix are comparing it to the libraries listed below
Sorting:
- ☆11May 30, 2021Updated 4 years ago
- The OWASP Testing Guide includes a "best practice" penetration testing framework which users can implement in their own organizations and…☆10Oct 12, 2019Updated 6 years ago
- ☆29Aug 12, 2021Updated 4 years ago
- ☆13Feb 14, 2020Updated 6 years ago
- ☆111May 30, 2021Updated 4 years ago
- ☆45Oct 19, 2021Updated 4 years ago
- C2Matrix Automation☆15Sep 10, 2023Updated 2 years ago
- ☆13Nov 22, 2022Updated 3 years ago
- ☆65Jun 5, 2021Updated 4 years ago
- ☆27Mar 25, 2021Updated 4 years ago
- ☆103Aug 31, 2021Updated 4 years ago
- PNPT Exam Preparation - TCM Security☆171Jul 25, 2021Updated 4 years ago
- Automatic cloud backup of Kali Linux data☆12Feb 27, 2020Updated 6 years ago
- ☆210Mar 4, 2022Updated 3 years ago
- Notebooks created to attack and secure Active Directory environments☆27Nov 18, 2019Updated 6 years ago
- DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. By default it will auto…☆14Oct 1, 2021Updated 4 years ago
- Automated DevOps is a repo that integrates Red Hat Linux 8, CentOS Stream and Oracle Linux 8 Packer templates for a vSphere & ESXi enterp…☆18Nov 26, 2025Updated 3 months ago
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, i…☆19Jan 28, 2022Updated 4 years ago
- eLearnSecurity Certified Exploit Development☆105Jul 25, 2021Updated 4 years ago
- ☆13Nov 4, 2019Updated 6 years ago
- A simple injector that uses LoadLibraryA☆18Jun 14, 2020Updated 5 years ago
- T-Guard Repository☆18May 2, 2024Updated last year
- A curated list of Awesome Threat Intelligence resources☆19Mar 27, 2019Updated 6 years ago
- ☆20May 18, 2022Updated 3 years ago
- A curated list of awesome threat detection and hunting resources☆20Apr 13, 2019Updated 6 years ago
- ☆18Mar 13, 2022Updated 3 years ago
- ☆158Sep 20, 2021Updated 4 years ago
- Conference Papers and Appendicies (USENIX Security, BlackHat, HITBSecConf, and BeVX)☆27Aug 6, 2023Updated 2 years ago
- Github Desktop RCE PoC☆28Dec 4, 2018Updated 7 years ago
- A set of tools for collecting forensic information☆27Apr 4, 2020Updated 5 years ago
- Dehashed API CLI☆22Oct 26, 2020Updated 5 years ago
- Fuxsociety Mr Robot 2.1☆28May 15, 2023Updated 2 years ago
- Guide For WAF Bypass Techniques☆28Aug 15, 2020Updated 5 years ago
- A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the…☆62Nov 26, 2025Updated 3 months ago
- ☆484Aug 12, 2022Updated 3 years ago
- A testing Red Team Infrastructure created with Docker☆32Apr 5, 2022Updated 3 years ago
- ☆32Aug 1, 2024Updated last year
- Experimental tagging schema for analysis of intersectionality, bias, and reception theories.☆11Feb 21, 2024Updated 2 years ago
- Core bypass Windows Defender and execute any binary converted to shellcode☆44Oct 12, 2021Updated 4 years ago