THOR MITRE ATT&CK Framework Coverage
☆25Jun 15, 2020Updated 5 years ago
Alternatives and similar repositories for thor_attck
Users that are interested in thor_attck are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Fast IOC and YARA Scanner☆90Mar 23, 2020Updated 6 years ago
- Simple SYSLOG client in Go☆22Jun 5, 2025Updated 9 months ago
- THOR Thunderstorm Collectors☆25Updated this week
- Valhalla API Client☆72Jan 19, 2026Updated 2 months ago
- Automated Real-Time Threat Hunting with ATD, Active Response and Elasticsearch/Kibana☆10Aug 17, 2018Updated 7 years ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆66Aug 10, 2022Updated 3 years ago
- IoC's, PCRE's, YARA's etc☆23Mar 25, 2025Updated 11 months ago
- Knowledge base of analytics designed to cover threats based on MITRE's ATT&CK.☆23Dec 13, 2018Updated 7 years ago
- Repository collecting and automagically processing public threat intelligence reports.☆19May 1, 2020Updated 5 years ago
- SmartResponse plugin development.☆15Sep 25, 2019Updated 6 years ago
- A curated list of awesome YARA rules, tools, and people.☆33Oct 26, 2023Updated 2 years ago
- WebAMS is an Open Source web application for reporting and resolving incidents or tickets☆10Dec 11, 2022Updated 3 years ago
- Carving tool based in Radare2 & Yara☆16Oct 30, 2018Updated 7 years ago
- Simplified go-cat agent for caldera☆11Dec 18, 2023Updated 2 years ago
- Public tools, scripts or code snippets that can help when working with our products☆46Mar 12, 2026Updated last week
- Carving tool based in Radare2 & Yara☆17Oct 30, 2018Updated 7 years ago
- Putting the Sauce in CyberChef - making CyberChef automatable☆19Feb 18, 2026Updated last month
- SigmaHQ pySigma CrowdStrike processing pipeline☆28Nov 30, 2025Updated 3 months ago
- ☆21Oct 28, 2021Updated 4 years ago
- A collection of typical false positive indicators☆56Dec 5, 2020Updated 5 years ago
- ATT&CK Remote Threat Hunting Incident Response☆206Dec 8, 2024Updated last year
- Notes some analysis related to VidarStealer sample☆16May 5, 2024Updated last year
- Stalk whoever you want on Github☆13Feb 7, 2020Updated 6 years ago
- Pentesting, Red Teaming. Reports☆11May 25, 2023Updated 2 years ago
- Heimdall Lite 2.0 is a JavaScript based security results viewer and review tool supporting multiple security results formats, such as: In…☆21Feb 11, 2022Updated 4 years ago
- "Repeater" style XSS post-exploitation tool for mass browser control. Primarily a PoC to show why HttpOnly flag isn't a complete protecti…☆14Mar 4, 2017Updated 9 years ago
- This repository contains the research and components of our research into using Sigma for AWS Incident Response.☆31Jul 12, 2023Updated 2 years ago
- Device profile: Define acceptable amounts of traffic for your devices and see a report of outliers.☆16Jan 28, 2020Updated 6 years ago
- Low-interaction Postgres Honeypot☆20May 20, 2024Updated last year
- Small and highly portable detection tests.☆12Oct 12, 2017Updated 8 years ago
- THOR APT Scanner User Manual☆20Mar 9, 2026Updated 2 weeks ago
- Python module to interact with THOR Thunderstorm service☆17Dec 5, 2025Updated 3 months ago
- TTPMapper is an AI-driven threat intelligence parser that converts unstructured reports whether from web URLs or PDF files into structure…☆51Jun 21, 2025Updated 9 months ago
- OPSEC - Operations Security☆18Nov 16, 2023Updated 2 years ago
- This is a project to receive Base64 data and decode it in process☆15Mar 16, 2020Updated 6 years ago
- Low-level MS Windows registry files analysis tools☆19May 5, 2016Updated 9 years ago
- public assets for ironcat emulation software ;)☆14Sep 8, 2023Updated 2 years ago
- A collection of Indicators of Compromise (IoCs), most aligning with samples derived from the signatures in the YARA-Signatures repo☆29Jun 11, 2020Updated 5 years ago
- CobaltStrike AggressorScripts for the lazy☆10Jul 22, 2022Updated 3 years ago