MalwareSoup / MitreAttackLinks
Python wrapper for the Mitre ATT&CK framework API
☆30Updated 7 years ago
Alternatives and similar repositories for MitreAttack
Users that are interested in MitreAttack are comparing it to the libraries listed below
Sorting:
- A WebDAV PROPFIND covert channel to deliver payloads☆52Updated 8 years ago
- POC for utilizing wikipedia API for Command and Control☆29Updated 3 years ago
- Automatically parses and attacks BloodHound-generated graphs☆42Updated 7 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 6 years ago
- SilkETW & SilkService☆40Updated 6 years ago
- splunk_pentest_app☆50Updated 9 years ago
- Slack/Microsoft Teams notification for new Empire/Meterpreter checkins☆25Updated last year
- Powershell script which will take any payload and put it in the a bat script which delivers the payload. The payload is delivered using e…☆56Updated last year
- ☆30Updated 7 years ago
- The project is called GreatSCT (Great Scott). GreatSCT is an open source project to generate application white list bypasses. This tool i…☆29Updated 7 years ago
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆53Updated 7 years ago
- ☆16Updated 10 years ago
- Scripts to detect Fast-Flux and DGA using DNS query responses☆44Updated 8 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆48Updated 8 years ago
- Python parser for Red Canary's Atomic Red Team Yamls☆27Updated 6 years ago
- LogRM is a post exploitation powershell script which it uses windows event logs to gather information about internal network☆74Updated 6 years ago
- ☆25Updated 7 years ago
- A Heroku-based web honeypot that can be used to create and monitor fake HTTP endpoints (i.e. honeytokens).☆65Updated 6 years ago
- Loads the AutoIt DLL and PowerShell assemblies into memory and executes the specified keystrokes☆62Updated 8 years ago
- A series of Bro Scripts created for detection purposes.☆19Updated 9 years ago
- Cybersecurity Incidents Mind Maps☆34Updated 4 years ago
- Volatility Framework plugin to detect various types of hooks as performed by banking Trojans☆40Updated 7 years ago
- Empire HTTP(S) C2 redirector setup script☆48Updated 7 years ago
- Gophish Python cli to perform huge phishing campaigns☆39Updated 7 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Updated 5 years ago
- Useful Windows and AD tools☆15Updated 3 years ago
- Docker projects to retain beacon source IPs using C2 relaying infra☆11Updated 6 years ago
- Indicator of Compromise Scanner for CVE-2019-19781☆94Updated 5 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 8 years ago
- This is a quick POC for using the Matt Nelson (enigma0x3) technique for generating a malicious .SettingContent-ms extension type for remo…☆54Updated 7 years ago