Actionable data for Security Operations
☆19Aug 26, 2021Updated 4 years ago
Alternatives and similar repositories for atc-data
Users that are interested in atc-data are comparing it to the libraries listed below
Sorting:
- SIEM USE Case Selection Methodology☆17Sep 18, 2020Updated 5 years ago
- vt-use-cases☆19Dec 1, 2023Updated 2 years ago
- Actionable analytics designed to combat threats based on MITRE's ATT&CK.☆23Aug 21, 2019Updated 6 years ago
- Push "BAD" IPs/Networks into QRadar's "Remote Networks", tag them properly, and use them!☆18Nov 5, 2013Updated 12 years ago
- ☆10Sep 11, 2021Updated 4 years ago
- CyCAT.org API back-end server including crawlers☆29Feb 4, 2023Updated 3 years ago
- A knowledge base of actionable Incident Response techniques☆662May 31, 2022Updated 3 years ago
- PowerSponse is a PowerShell module focused on targeted containment and remediation during incident response.☆40Mar 18, 2022Updated 3 years ago
- Sightings Ecosystem gives cyber defenders visibility into what adversaries actually do in the wild. With your help, we are tracking MITRE…☆38May 28, 2025Updated 9 months ago
- A collection of personal ZAP scripts☆13Apr 10, 2023Updated 2 years ago
- ☆10Dec 19, 2023Updated 2 years ago
- Contains research.splunk.com site code☆11Apr 10, 2024Updated last year
- ☆11Dec 11, 2022Updated 3 years ago
- BSD-licensed open source Java library for consuming NVDB REST API☆14Sep 5, 2025Updated 5 months ago
- Implementing ISO/IEC 27001:2022, by EC-Council☆15Feb 20, 2026Updated last week
- Command line tools for Qualcomm EFS file system☆11Jan 16, 2020Updated 6 years ago
- Iot BeeHive Monitoring using Balena.io☆12Mar 7, 2022Updated 3 years ago
- Powershell to read ETL file on an interval and convert it to an EVTX (so Windows Event Forwarding can 'subscribe')☆11May 16, 2017Updated 8 years ago
- ☆13Sep 22, 2017Updated 8 years ago
- Some YARA rules i will add from time to time☆12May 31, 2019Updated 6 years ago
- Tflint rules for CIS AWS Foundations Benchmark compliance checks. These rules work in addition to the recommendations from Gruntwork's CI…☆12Feb 18, 2023Updated 3 years ago
- A collection of curated Java Deserialization Exploits☆11May 22, 2018Updated 7 years ago
- Standardizing Security Titles☆13Dec 31, 2025Updated 2 months ago
- Archive for data from mcbroken.com.☆13Updated this week
- Disk Image Mounting Script☆11Jan 22, 2026Updated last month
- ☆12Oct 25, 2023Updated 2 years ago
- This package allows reading and writing bettercap's session recordings.☆14Apr 8, 2019Updated 6 years ago
- Plans for DIY nanodrop☆10Oct 18, 2019Updated 6 years ago
- Automated Real-Time Threat Hunting with ATD, Active Response and Elasticsearch/Kibana☆10Aug 17, 2018Updated 7 years ago
- Lightweight SMTP connection pool with clustering support, wait/release mechanism, connection lifecycle management, eager/lazy loading poo…☆12Sep 15, 2024Updated last year
- SHell TempLating☆12Apr 8, 2025Updated 10 months ago
- multi-cluster gateway controller, manages multi-cluster gateways based on gateway api and policy attachment☆11Dec 11, 2024Updated last year
- Kestrel Jupyter Notebook Kernel☆10Oct 19, 2023Updated 2 years ago
- Real time graph generator of the network topology using traceroute, nmap and arborJS☆12Dec 1, 2013Updated 12 years ago
- Parsers for common structures across windows formats.☆12Aug 23, 2023Updated 2 years ago
- This DuckyScript, created by ooovenenoso, automates the removal of problematic CrowdStrike files causing BSOD on Windows. The script open…☆11Jul 23, 2024Updated last year
- Website for breaches.net☆10Nov 9, 2022Updated 3 years ago
- OpenDXL Console is a high-level web-based console for interacting with a DXL fabric☆11Mar 29, 2021Updated 4 years ago
- Code for the USB write blocker built on the FTDI VNC2 development board☆10Aug 17, 2021Updated 4 years ago