☆77Jul 22, 2020Updated 5 years ago
Alternatives and similar repositories for mitre_attack
Users that are interested in mitre_attack are comparing it to the libraries listed below
Sorting:
- Splunk app for visualization of DMARC RUA mails☆15Sep 26, 2025Updated 5 months ago
- OASIS Cyber Threat Intelligence (CTI) TC: A tool for generating STIX content for prototyping and testing. https://github.com/oasis-open/c…☆43Apr 15, 2024Updated last year
- Cyber Threats Detection Rules☆14Sep 16, 2025Updated 5 months ago
- Mitre Att&ck Technique Emulation☆82Mar 6, 2019Updated 6 years ago
- It is a repository for Red Team emulation based on MITRE ATT&CK.☆16Aug 5, 2019Updated 6 years ago
- MITRE ATT&CK Windows Logging Cheat Sheets☆348Nov 8, 2018Updated 7 years ago
- Splunk App for MITRE Att&CK Navigator(TM)☆23Mar 25, 2021Updated 4 years ago
- The hidden mstsc recorder player☆27Mar 9, 2020Updated 5 years ago
- Threat Alert Logic Repository☆93Feb 7, 2019Updated 7 years ago
- Dovehawk is a Zeek module that automatically imports MISP indicators and reports Sightings☆122Jul 12, 2021Updated 4 years ago
- Utilities for MITRE™ ATT&CK☆1,050Jan 3, 2026Updated last month
- Security Monitoring Resolution Categories☆138Nov 25, 2021Updated 4 years ago
- Cyber Analytics Repository☆984May 16, 2025Updated 9 months ago
- All my POC related to malware development☆15Feb 19, 2026Updated last week
- Bro scripts to monitor for new hosts within a subnet range that aren't whitelisted/vetted.☆13Jun 28, 2013Updated 12 years ago
- Various components we use in labs☆10Oct 30, 2020Updated 5 years ago
- Pragmatic Network Security for Cloud and Hybrid Networks☆10Nov 24, 2015Updated 10 years ago
- Next major release of sniffMyPackets - Now with added packet loving☆12Mar 19, 2015Updated 10 years ago
- Adversary Emulation Planner☆42Jan 9, 2026Updated last month
- A tool to help malware analysts signature unique parts of RTF documents☆28Jan 5, 2026Updated last month
- WiP - cve-search next gen☆13Jan 18, 2020Updated 6 years ago
- A framework for developing alerting and detection strategies for incident response.☆841Sep 8, 2025Updated 5 months ago
- This content is analysis and research of the data sources currently listed in ATT&CK.☆414Sep 13, 2023Updated 2 years ago
- A Zeek package that detects Zoom logins and meeting joins☆12Apr 15, 2020Updated 5 years ago
- Reviews and tests of security products☆17Dec 28, 2024Updated last year
- Python 3 library to build YARA rules.☆13Oct 24, 2021Updated 4 years ago
- ☆13Apr 8, 2022Updated 3 years ago
- ☆17Oct 26, 2021Updated 4 years ago
- Bundle of security analysis scripts for keras tensorflow models☆16Apr 15, 2024Updated last year
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Apr 18, 2020Updated 5 years ago
- ☆37Nov 22, 2023Updated 2 years ago
- Actionable analytics designed to combat threats☆1,005May 25, 2022Updated 3 years ago
- Terraform scripts for deploying OpenCTI to AWS, Azure, and GCP☆34Apr 2, 2024Updated last year
- Visualize your Terraform files☆34Sep 9, 2020Updated 5 years ago
- Sentinel BEC IR☆14Aug 18, 2022Updated 3 years ago
- Golang PoC that sandboxes Defender (or other PPL) by setting its token integrity to Untrusted.☆12May 28, 2025Updated 9 months ago
- Template repository and README for submissions to Bellingcat's Global Hackathon☆16Oct 7, 2022Updated 3 years ago
- This extension provide a Python panel for writing custom proxy script.☆16Aug 26, 2019Updated 6 years ago
- Bulk turn on Analytic rules in Azure Sentinel☆19Oct 7, 2021Updated 4 years ago