THOR MITRE ATT&CK Framework Coverage
☆25Jun 15, 2020Updated 5 years ago
Alternatives and similar repositories for thor_attck
Users that are interested in thor_attck are comparing it to the libraries listed below
Sorting:
- Simple SYSLOG client in Go☆22Jun 5, 2025Updated 8 months ago
- THOR Thunderstorm Collectors☆25Feb 24, 2026Updated last week
- Fast IOC and YARA Scanner☆90Mar 23, 2020Updated 5 years ago
- Valhalla API Client☆70Jan 19, 2026Updated last month
- Automated Real-Time Threat Hunting with ATD, Active Response and Elasticsearch/Kibana☆10Aug 17, 2018Updated 7 years ago
- Simplified go-cat agent for caldera☆11Dec 18, 2023Updated 2 years ago
- Carving tool based in Radare2 & Yara☆16Oct 30, 2018Updated 7 years ago
- SmartResponse plugin development.☆15Sep 25, 2019Updated 6 years ago
- THOR APT Scanner User Manual☆20Jan 30, 2026Updated last month
- Device profile: Define acceptable amounts of traffic for your devices and see a report of outliers.☆16Jan 28, 2020Updated 6 years ago
- Carving tool based in Radare2 & Yara☆17Oct 30, 2018Updated 7 years ago
- A curated list of awesome YARA rules, tools, and people.☆33Oct 26, 2023Updated 2 years ago
- Repository collecting and automagically processing public threat intelligence reports.☆18May 1, 2020Updated 5 years ago
- Knowledge base of analytics designed to cover threats based on MITRE's ATT&CK.☆23Dec 13, 2018Updated 7 years ago
- "Repeater" style XSS post-exploitation tool for mass browser control. Primarily a PoC to show why HttpOnly flag isn't a complete protecti…☆14Mar 4, 2017Updated 8 years ago
- Manufacturer Usage Description (MUD) is a technique whereby constrained end devices (e.g., IoT devices) can signal to the network what so…☆25Jul 5, 2021Updated 4 years ago
- Low-interaction Postgres Honeypot