This tool maps a file's behavior on MITRE ATT&CK matrix.
☆60Mar 4, 2020Updated 6 years ago
Alternatives and similar repositories for Hachi
Users that are interested in Hachi are comparing it to the libraries listed below
Sorting:
- David is a very funny man☆10Feb 19, 2021Updated 5 years ago
- Mitigation validation utility for the Ivanti Connect Around attack chain. Runs multiple checks. CVE-2023-46805, CVE-2024-21887.☆12Feb 3, 2024Updated 2 years ago
- FACT analysis plug-in that maps software version to cves☆13Nov 14, 2019Updated 6 years ago
- ☆13Aug 31, 2024Updated last year
- Intelligence-Led Cyber Attack Taxonomy, CAT☆11Aug 7, 2019Updated 6 years ago
- Twitter Bot to perform advanced search and automated response☆13Dec 22, 2017Updated 8 years ago
- MALOnt - an ontology for Malware Threat Intelligence.☆13Jul 8, 2021Updated 4 years ago
- make virus without coding☆12Apr 7, 2020Updated 5 years ago
- Semi-Intelligent HoneyPot Network - Semi-Intelligent Reactive Environment Network☆15Mar 17, 2018Updated 7 years ago
- ☆18Jan 8, 2024Updated 2 years ago
- Windows log and threat hunting with powershell☆16Dec 11, 2020Updated 5 years ago
- A virtual MediaWiki development environment, built on Vagrant, VirtualBox, and Puppet.☆16Dec 1, 2016Updated 9 years ago
- Six Degrees of Domain Admin☆15Oct 23, 2017Updated 8 years ago
- create cypher create statements for neo4j out of netstat files from multiple machines☆41Dec 28, 2020Updated 5 years ago
- A demo of asynchronous generation of static html pages using Django 3.0 + Celery 4.4 + Redis 3.3.☆15Jan 6, 2022Updated 4 years ago
- FireEye iSIGHT Alert Feeder for TheHive, an Open Source and Free Security Incident Response Platform☆16Oct 12, 2018Updated 7 years ago
- This repo contains workshop material delivered at #nullcon2020☆16Mar 6, 2020Updated 6 years ago
- ArmourBird CSF - Container Security Framework☆44Apr 22, 2022Updated 3 years ago
- Repo containing docker-compose files and setup scripts without having to clone the individual reternal components☆110Mar 25, 2021Updated 4 years ago
- Mitre Att&ck Technique Emulation☆82Mar 6, 2019Updated 7 years ago
- Automate SSH communication with firewalls, switches, etc.☆27Mar 29, 2018Updated 7 years ago
- Source code of Malware Classification by Learning Semantic and Structural Features of Control Flow Graphs (TrustCom 2021)☆22Mar 17, 2022Updated 3 years ago
- ☆21May 13, 2019Updated 6 years ago
- S2AN - Mapper of Sigma/Suricata Rules/Signatures ➡️ MITRE ATT&CK Navigator☆91Dec 8, 2022Updated 3 years ago
- Dr. Mine is a node script written to aid automatic detection of in-browser cryptojacking.☆49Feb 8, 2020Updated 6 years ago
- ☆25May 9, 2021Updated 4 years ago
- Repo for experimenting and testing MCP server builds for CTI-related research.☆27May 13, 2025Updated 9 months ago
- ☆70Dec 4, 2018Updated 7 years ago
- Just a place to dump the cdma data I collected while at Defcon 2016☆50Nov 2, 2016Updated 9 years ago
- Simple golang shodan cli☆49Apr 1, 2021Updated 4 years ago
- A feed of malware samples curated from threat intelligence sources.☆28Oct 6, 2023Updated 2 years ago
- Capture, upload and analyze network traffic; powered by PacketTotal.com.☆96Mar 12, 2020Updated 5 years ago
- A lightweight CLI tool that finds system calls being called inside golang applications.☆31Oct 22, 2021Updated 4 years ago
- References for FIRST CTI 2019 Symposium presentation☆23Mar 19, 2019Updated 6 years ago
- By far it is my best and biggest GDI malware I've ever created for educational & entertainment purposes.☆26Nov 7, 2024Updated last year
- Automated Tactics Techniques & Procedures☆259May 26, 2023Updated 2 years ago
- A tool to cluster similar executables (PEs, DEXs, and etc), extract common signature, and generate Yara patterns for malware detection.☆26Jan 5, 2019Updated 7 years ago
- 一款http协议的漏洞扫描框架☆27Jan 17, 2020Updated 6 years ago
- DDoS protection system PoC for HaProxy☆29Jun 14, 2021Updated 4 years ago