EfstratiosLontzetidis / WhatHitMeLinks
WhatHitMe is a Python3 tool which provides the possible Groups and their attributed Campaigns that may have attacked you in an incident, based on specific Techniques and Software you have identified (MITRE ATT&CK). It supports both enterprise, mobile and ICS matrixes. It also provides searches to known sources for these Groups for insight!
☆18Updated 2 years ago
Alternatives and similar repositories for WhatHitMe
Users that are interested in WhatHitMe are comparing it to the libraries listed below
Sorting:
- Daily C2 threat intelligence feed☆19Updated this week
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆125Updated last year
- Track C2 servers, tools, and botnets over time by framework and location☆43Updated 9 months ago
- VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data …☆148Updated 3 months ago
- This repository contains a comprehensive testing designed for evaluating the performance and resilience of Endpoint Detection and Respons…☆61Updated last year
- Powershell tools used for Red Team / Pentesting.☆79Updated last year
- A collection of CVEs weaponized by ransomware operators☆126Updated last month
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆221Updated 7 months ago
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆104Updated 2 years ago
- Collection of scripts to automate the Malware Analysis process☆28Updated 3 weeks ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆68Updated last year
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆150Updated last year
- Free training course offered at Hack Space Con 2023☆139Updated 2 years ago
- Completely Risky Active-Directory Simulation Hub☆103Updated 2 years ago
- ☆75Updated 2 months ago
- Threat Hunting Malware Infrastructure☆10Updated last year
- List of Command&Control (C2) software☆46Updated 3 years ago
- A curated list of awesome LOLBins, GTFO projects, and similar 'Living Off the Land' security resources.☆202Updated last year
- LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.☆192Updated 9 months ago
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe☆36Updated last year
- ShellSweeping the evil.☆181Updated 11 months ago
- ☆111Updated 4 months ago
- ☆43Updated 11 months ago
- CarbonBlack EDR detection rules and response actions☆73Updated last year
- ☆37Updated last year
- Dissecting and Defeating Ransomware's Evasion Tactics Defcon 32☆17Updated last year
- autoNTDS is an automation script designed to simplify the process of dumping and cracking NTDS hashes using secretsdump.py and hashcat☆109Updated 2 years ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆83Updated last year
- Raw data from Threat Intelligence Reports with automatic reports collection and keyword search across thousands of reports☆140Updated this week
- A collection of methods to learn who the owner of an IP address is.☆178Updated last month