Actionable data for Security Operations
☆19Aug 26, 2021Updated 4 years ago
Alternatives and similar repositories for atc-data
Users that are interested in atc-data are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- vt-use-cases☆20Dec 1, 2023Updated 2 years ago
- Collection of configuration files that can be used as good starting points to secure different services and tools☆17Nov 11, 2025Updated 4 months ago
- SIEM USE Case Selection Methodology☆17Sep 18, 2020Updated 5 years ago
- 🐻❄️ 🏹 Threat hunting with Polars and flaws.cloud AWS CloudTrail datasets.☆14May 22, 2024Updated last year
- Share your Yara rules with VirusTotal☆28Aug 12, 2024Updated last year
- Push "BAD" IPs/Networks into QRadar's "Remote Networks", tag them properly, and use them!☆18Nov 5, 2013Updated 12 years ago
- Contains research.splunk.com site code☆11Apr 10, 2024Updated last year
- Actionable analytics designed to combat threats based on MITRE's ATT&CK.☆23Aug 21, 2019Updated 6 years ago
- ☆14Sep 8, 2022Updated 3 years ago
- Miscellaneous, unrelated PowerShell scripts.☆13Feb 23, 2026Updated last month
- A knowledge base of actionable Incident Response techniques☆662May 31, 2022Updated 3 years ago
- This repository contains a collection of PowerShell tools that can be utilized to protect and defend an environment based on the recommen…☆52Sep 14, 2025Updated 6 months ago
- A virtual MediaWiki development environment, built on Vagrant, VirtualBox, and Puppet.☆16Dec 1, 2016Updated 9 years ago
- Small cyber challenges for fun and no profit☆12May 20, 2025Updated 10 months ago
- ☆19Dec 9, 2024Updated last year
- CyCAT.org API back-end server including crawlers☆29Feb 4, 2023Updated 3 years ago
- Détection d'anomalie à partir des journaux d'authentification Windows☆18Apr 16, 2021Updated 4 years ago
- A threat sighting collects the behavior of a real threats and the observables used during its engagement.☆12Mar 29, 2022Updated 3 years ago
- Workflows for Shuffle☆24Oct 26, 2022Updated 3 years ago
- Yet another VirusTotal API wrapper for Ruby☆14Oct 17, 2023Updated 2 years ago
- ☆13Jul 4, 2024Updated last year
- Archive of the official Microsoft VibeVoice repository (7B & 1.5B). Backup of the deleted source code for the open-source TTS models, inc…☆27Sep 5, 2025Updated 6 months ago
- ☆13Jul 30, 2021Updated 4 years ago
- All Zero Nights 2016 'A threat hunter himself' stuff☆16Nov 18, 2016Updated 9 years ago
- HECTOR☆20Mar 3, 2017Updated 9 years ago
- Generate a matrix based on an inventory of InfoSec tools☆24Jul 4, 2024Updated last year
- Standardizing Security Titles☆13Dec 31, 2025Updated 2 months ago
- ☆10Sep 11, 2021Updated 4 years ago
- Ensemble-HackTools is an awesome collection of hacking tools.☆28May 8, 2024Updated last year
- Command line client for the Fugue API☆14Mar 7, 2023Updated 3 years ago
- Forensics artifacts collection☆21Jun 18, 2021Updated 4 years ago
- Nessus Vulnerability visualization for the web☆31Jan 25, 2016Updated 10 years ago
- Actionable analytics designed to combat threats☆1,005May 25, 2022Updated 3 years ago
- macOS vulnerability management for individuals☆27Jan 7, 2023Updated 3 years ago
- ☆17Jan 17, 2025Updated last year
- changelog release management tool☆52Nov 16, 2017Updated 8 years ago
- PE Injection with ring3 hook bypass☆10May 3, 2021Updated 4 years ago
- Automatically exported from code.google.com/p/hookme☆13Oct 8, 2015Updated 10 years ago
- OXA - Open XDR architecture☆13Apr 1, 2025Updated 11 months ago