ATT&CK Evaluations Library
☆99Jan 22, 2026Updated 3 months ago
Alternatives and similar repositories for ael
Users that are interested in ael are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Process doppelganging POC using direct system calls, PPID spoofing and dropbox as an external delivery channel for the payload.☆17Jan 7, 2021Updated 5 years ago
- A python polymorphic engine for C programs☆11Dec 8, 2023Updated 2 years ago
- Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. The research…☆61Mar 2, 2026Updated 2 months ago
- A bunch of shenanigans using functions, VEH and more☆37Jun 8, 2025Updated 11 months ago
- FIles and guides related to using Elasticstack as a SIEM☆12May 16, 2020Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.☆2,106May 28, 2025Updated 11 months ago
- SIEM USE Case Selection Methodology☆17Sep 18, 2020Updated 5 years ago
- Scripts and a short guide for using them to tier an Active Directory. Made for BSides Copenhagen 2024☆39Oct 20, 2025Updated 7 months ago
- A tool to sync mythic events with ghostwriter oplog.☆14Nov 21, 2024Updated last year
- AI-Powered, Local Pythonic Coding Agent 🐞💻☆25Mar 3, 2025Updated last year
- Repo to hold mcp server for velociraptor☆38Apr 15, 2026Updated last month
- ☆21Feb 6, 2024Updated 2 years ago
- Shellcode Loader using indirect syscalls☆16Jan 21, 2024Updated 2 years ago
- Detection for CVE-2025-61882 & CVE-2025-61884☆36Oct 14, 2025Updated 7 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Thor Artifacts for Velociraptor☆19Dec 2, 2025Updated 5 months ago
- CVE-2020-1337 a bypass of (PrintDemon) CVE-2020-1048’s patch☆14Aug 11, 2020Updated 5 years ago
- Mentally ill EtwTi parser☆72Jan 11, 2026Updated 4 months ago
- An automated Adversary Emulation lab with terraform and MCP server. Build Caldera techniques and operations assisted with LLMs. Built f…☆209Nov 23, 2025Updated 5 months ago
- Extracts indicators of compromise (IOCs), including domain names, IPv4 addresses, email addresses, and hashes, from text.☆11Dec 10, 2017Updated 8 years ago
- A Lazy Programmer's Tips for Avoiding the SOC ~ BSides Belfast 2024☆16Sep 12, 2024Updated last year
- Simple implementation of scientific paper 'GAC: Graph-Based Alert Correlation for the Detection of Distributed Multi-Step Attacks'☆19May 12, 2019Updated 7 years ago
- Hacked up scripts to perform google searches☆16Apr 26, 2024Updated 2 years ago
- A proof-of-concept shellcode loader that leverages AI/ML face recognition models to verify the identity of a user on a target system☆44Oct 30, 2024Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Storage for the IOCs I collect☆11Apr 3, 2026Updated last month
- Cobalt Strike notifications via NTFY.☆15Sep 24, 2024Updated last year
- Some talks about security☆12Nov 20, 2020Updated 5 years ago
- This repository bundles various utilities and scripts I built for use with IBM QRadar SIEM☆16Jan 30, 2026Updated 3 months ago
- This is repositories with all my ASL scripts☆11Sep 11, 2024Updated last year
- A naive implementation of HERCULE, an attack story reconstruction system using community discovery on correlated log graph☆15Aug 27, 2017Updated 8 years ago
- A framework for the Analysis of Intrusion Detection Alerts☆17Nov 11, 2021Updated 4 years ago
- ☆10Aug 28, 2020Updated 5 years ago
- Convert auditd logs to json format☆10Apr 3, 2019Updated 7 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- EPSScall☆11Jun 10, 2022Updated 3 years ago
- Open-source methodology on pentesting and risk mitigation☆14Oct 20, 2020Updated 5 years ago
- An IntelliJ plugin for RPM SPEC file support☆12Jul 28, 2025Updated 9 months ago
- A tool that allows you to create vulnerable instrumented local or cloud environments to simulate attacks against and collect the data int…☆2,489May 9, 2026Updated last week
- A simple script that edits the XML of a macro-enabled Word document (.docm or Word 97 document) to add a reference to a remote stylesheet…☆11Oct 5, 2022Updated 3 years ago
- Projected developed for fun only that simulates APT 29 and Lockbit TTPs, showcasing phishing, ISO execution, and DLL proxying for persist…☆63May 3, 2024Updated 2 years ago
- A large repository of links spanning all topics in information security.☆13Mar 18, 2016Updated 10 years ago