MalwareSoup / MitreAttack
Python wrapper for the Mitre ATT&CK framework API
☆26Updated 6 years ago
Alternatives and similar repositories for MitreAttack:
Users that are interested in MitreAttack are comparing it to the libraries listed below
- Python parser for Red Canary's Atomic Red Team Yamls☆27Updated 5 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Updated 4 years ago
- SilkETW & SilkService☆40Updated 5 years ago
- The project is called GreatSCT (Great Scott). GreatSCT is an open source project to generate application white list bypasses. This tool i…☆29Updated 6 years ago
- ☆46Updated 7 years ago
- A Windows REG file to enable all default PowerShell logging on a system with PowerShell v5 installed☆16Updated 8 years ago
- POC for utilizing wikipedia API for Command and Control☆29Updated 2 years ago
- Gophish Python cli to perform huge phishing campaigns☆40Updated 6 years ago
- IoC's, PCRE's, YARA's etc☆22Updated 2 months ago
- Docker projects to retain beacon source IPs using C2 relaying infra☆11Updated 5 years ago
- Repository of Information sharing on threats and indicators☆12Updated 4 years ago
- The repository contains IOCs in CSV format for APT, Cyber Crimes, Malware and Trojan and whatever I found as part of hunting and research☆12Updated 7 years ago
- AV Bypass☆29Updated 7 years ago
- Powershell script which will take any payload and put it in the a bat script which delivers the payload. The payload is delivered using e…☆52Updated 9 months ago
- ☆22Updated 4 years ago
- The repository for Building visualisation platforms for OSINT data using open source solutions☆30Updated 6 years ago
- Various snippets created during malware analysis☆22Updated 6 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆42Updated 4 years ago
- Performs OCR on image files and scans them for matches to YARA rules☆40Updated 6 years ago
- Forked and updated with some additional features over the original☆16Updated 3 years ago
- A set of compiled application restriction bypasses☆29Updated 7 years ago
- CertWatcher is a new take on monitoring for phishing sites. It is meant to be a set and forget service that will send you a daily report …☆11Updated 4 years ago
- Opening CobaltStrike to a wider world☆8Updated 6 years ago
- Useful Windows and AD tools☆15Updated 2 years ago
- Comprehensive Pivoting Framework☆20Updated 8 years ago
- Presentation materials for talks I've given.☆20Updated 5 years ago
- Light System Examination Toolkit (LISET) - logs & activity & configuration gathering utility that comes handy in fast Windows incident re…☆27Updated 8 years ago
- Data exfiltration using reflective DNS resolution covert channel☆51Updated 7 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 7 years ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Updated 3 years ago