☆20Jan 12, 2022Updated 4 years ago
Alternatives and similar repositories for ATTACK_data_sources
Users that are interested in ATTACK_data_sources are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Slack bot which promotes Defense in Depth/Zero Trust security practices☆24Jan 17, 2023Updated 3 years ago
- one-time use token phishing toolkit☆12May 30, 2020Updated 5 years ago
- ☆21Updated this week
- Some resources to facilitate my blog on auditd for security monitoring☆13Mar 23, 2023Updated 3 years ago
- Compilation of commands for hacking tasks and security tools as a bit of everything☆15Jul 3, 2025Updated 9 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Ekoparty's BlueSpace Keynote November 2021. Shoutout to @plugxor Muchas Gracias!!!☆13Jun 5, 2023Updated 2 years ago
- Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.☆16May 21, 2021Updated 4 years ago
- Easily scan with multiple yara rules from different sources.☆14Mar 9, 2024Updated 2 years ago
- SIEM Detection Use Case Library mapped to MITRE ATT&CK tactics and techniques☆12Oct 28, 2018Updated 7 years ago
- Docker compose Assemblyline 4 deployment (appliance and development)☆17Apr 1, 2026Updated 2 weeks ago
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆61Mar 12, 2022Updated 4 years ago
- Resources To Learn And Understand SIGMA Rules☆183Feb 14, 2023Updated 3 years ago
- Continuous External Attack Surface Discovery & Vulnerability Scanning Across AWS Organizations — Python CDK☆13Mar 6, 2026Updated last month
- Exploit for PlaySMS 1.4 authenticated RCE☆14Nov 6, 2018Updated 7 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- The following repository contains the SecurityTube Linux Assembly Expert assignments, and exam☆18Nov 27, 2017Updated 8 years ago
- excalidraw docker copy from gitlab.open-mind.space/pandel/excalidraw-docker☆13Feb 17, 2022Updated 4 years ago
- Script to create MITRE ATT&CK Navigator layers from the annotated detection rules in Elastic Security (Kibana).☆20Jul 1, 2023Updated 2 years ago
- Easy to extend initial access scenario to help with EDR testing on Linux and Mac☆26Mar 20, 2022Updated 4 years ago
- A collection of Sigma rules organized by MITRE ATT&CK technique☆18Apr 1, 2026Updated 2 weeks ago
- ☆21May 8, 2022Updated 3 years ago
- List of AWS Services and Actions☆45Jul 15, 2025Updated 9 months ago
- Applying some AV evasion techniques on a metasploit reverse shell☆18Nov 12, 2020Updated 5 years ago
- A simple linter for Sigma rules☆13Oct 22, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- OSSEM Detection Model☆184Oct 11, 2022Updated 3 years ago
- ☆48Feb 22, 2023Updated 3 years ago
- ☆19Jun 16, 2021Updated 4 years ago
- Threat Detection & Anomaly Detection rules for popular open-source components☆53Jul 27, 2022Updated 3 years ago
- A PowerShell script for helping to find vulnerable settings in AD Group Policy.☆16Jan 8, 2019Updated 7 years ago
- Script to retrieve the list of AWS Services and their one-line descriptions☆37Dec 25, 2020Updated 5 years ago
- An SSH honeypot written entirely in Go.☆14Dec 4, 2025Updated 4 months ago
- Simple backdoor written in .bat for windows that use NetCat☆18Aug 6, 2016Updated 9 years ago
- Detect which Linux distro, macOS or BSD version a system is running.☆22Mar 11, 2026Updated last month
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Defender for Endpoint☆28Mar 28, 2026Updated 2 weeks ago
- Simple command to colorize the stderr of a target program☆12Sep 20, 2017Updated 8 years ago
- ☆93Jul 30, 2025Updated 8 months ago
- Terraform + Diagrams: Provisioning and visualizing a simple environment on AWS☆52Apr 5, 2022Updated 4 years ago
- Automatically create YARA rules from malicious documents.☆211May 16, 2022Updated 3 years ago
- My Python Cookiecutter project template☆32Sep 6, 2022Updated 3 years ago
- A Splunk App containing Sigma detection rules, which can be updated from a Git repository.☆111Feb 6, 2020Updated 6 years ago