AttackMatrix is a Python module and/or webpage to interact with and explore MITRE's ATT&CK's matrices.
☆17Apr 19, 2023Updated 2 years ago
Alternatives and similar repositories for AttackMatrix
Users that are interested in AttackMatrix are comparing it to the libraries listed below
Sorting:
- POC: Heap buffer overflow in the networking code in the XNU operating system kernel☆14Feb 25, 2024Updated 2 years ago
- Procedure to dockerize Cisco Nexus 9000v to test NX-OS with CI☆21May 23, 2021Updated 4 years ago
- Scanner which is capable of scanning multiple hosts or multiple subnets on an SSL port and output a CSV file with the certificate details…☆14Nov 29, 2013Updated 12 years ago
- Repository for scripts and tips for "Yara Scan Service"☆20Feb 19, 2023Updated 3 years ago
- Identify and extract files from container formats using unblob.☆26Nov 19, 2024Updated last year
- Writeups for CTF that took place in 2015.☆13Mar 22, 2016Updated 9 years ago
- ☆18Jun 23, 2017Updated 8 years ago
- ⚠️ ARCHIVED**: This repository is no longer actively maintained. All Sigma rules are now managed and available in SIEM Rules☆12Updated this week
- a-ray-grass is a yara module that provides support for DCSO-format bloom filters in yara. In the context of hashlookup, it allows quickly…☆14Aug 19, 2022Updated 3 years ago
- ☆18May 9, 2020Updated 5 years ago
- NHS Hack Day website☆13Jan 28, 2026Updated last month
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- This script is used for extracting DDE in docx and xlsx☆12Dec 8, 2017Updated 8 years ago
- Deduplication of yara rules☆10Sep 18, 2017Updated 8 years ago
- ripPE - section extractor and profiler for PE file analysis☆33Aug 8, 2014Updated 11 years ago
- A Google App Engine application to archive the posts from Hacker News☆16Jun 3, 2018Updated 7 years ago
- Integration between MISP platform and McAfee MVISION EDR☆14Mar 14, 2022Updated 4 years ago
- Capa analysis importer for Ghidra.☆64Dec 2, 2020Updated 5 years ago
- Cyber Underground General Intelligence Requirements☆98Feb 2, 2024Updated 2 years ago
- ☆15Sep 26, 2022Updated 3 years ago
- ☆29May 1, 2020Updated 5 years ago
- Data related to the SANS Internet Storm Center☆13Sep 12, 2025Updated 6 months ago
- Programmable automated machine learning - proof of concept☆15Oct 9, 2024Updated last year
- ☆73Sep 4, 2023Updated 2 years ago
- ☆19Dec 3, 2012Updated 13 years ago
- Low-tech medication reminder application that can call or text a user with a custom message on any desired schedule.☆13Feb 7, 2016Updated 10 years ago
- YAFRA is a semi-automated framework for analyzing and representing reports about IT Security incidents.☆27Dec 14, 2021Updated 4 years ago
- MSTIC Notebook Components☆35Sep 4, 2025Updated 6 months ago
- A streamlined way to create STIX documents!☆31Apr 30, 2014Updated 11 years ago
- Client library for the mwdb service by CERT Polska.☆42Feb 10, 2026Updated last month
- Network detector for Winnti malware☆21Mar 6, 2018Updated 8 years ago
- A python script that can be used to scan data within in an IDB using Yara.☆23Sep 4, 2018Updated 7 years ago
- Validate IOC from MISP ; Export results and iocs to SIEM and sensors using syslog and CEF format☆14Sep 13, 2016Updated 9 years ago
- UKPlanning provides scraper classes to access data from planning authorities in the UK. Note this version is the only openly available pu…☆16Feb 9, 2019Updated 7 years ago
- LD_PRELOAD rootkit utils☆16Jul 3, 2015Updated 10 years ago
- Memory Loader Open Source Project by Sentinel-Labs.☆25Mar 26, 2021Updated 4 years ago
- GoTEE - example application☆17Mar 9, 2026Updated last week
- I am a simple shell script that downloads all repositories from a user and then hunts them for sh1t.☆11Jul 21, 2022Updated 3 years ago
- Docker container bundling tools for manual AWS security reviews☆12Sep 12, 2018Updated 7 years ago