A collection of Sigma rules organized by MITRE ATT&CK technique
☆18Jul 26, 2021Updated 4 years ago
Alternatives and similar repositories for sigma-rules
Users that are interested in sigma-rules are comparing it to the libraries listed below
Sorting:
- ☆19Oct 23, 2020Updated 5 years ago
- SharpReg is a simple code set to interact with the Remote Registry service api and is compatible with Cobalt Strike.☆28Apr 12, 2020Updated 5 years ago
- Lifetime AMSI bypass.☆36Apr 21, 2025Updated 10 months ago
- DPE - Default Password Enumeration☆37Jun 3, 2013Updated 12 years ago
- A triage data collection script for macOS☆29Nov 27, 2020Updated 5 years ago
- A simple Docker container that serves the MITRE ATT&CK Navigator web app☆27Apr 23, 2023Updated 2 years ago
- ☆36Nov 26, 2024Updated last year
- Python wrappers for mal_unpack☆37Sep 19, 2023Updated 2 years ago
- IP range distributed scanner for vulnerable Hikvision cameras☆27Jul 10, 2019Updated 6 years ago
- ☆33Apr 7, 2020Updated 5 years ago
- 🌌 Real-time threat detection for smart contracts☆10May 16, 2023Updated 2 years ago
- ETHICAL-HACKING☆12Dec 20, 2023Updated 2 years ago
- Scripts for public use that we've randomly written, or have updated from other people's work.☆40Jun 25, 2024Updated last year
- Matryoshka loader is a tool that red team operators can leverage to generate shellcode for Microsoft Office document phishing payloads.☆43May 24, 2021Updated 4 years ago
- Event Query Router☆12Aug 9, 2019Updated 6 years ago
- Java DNS Post Exploitation Tool☆11Jul 21, 2024Updated last year
- Pentesting Suite☆65Jul 1, 2025Updated 8 months ago
- A Sublime Text plugin that allows for Nmap syntax highlighting☆13Sep 14, 2024Updated last year
- morphHTA - Morphing Cobalt Strike's evil.HTA☆10Jun 3, 2017Updated 8 years ago
- Contains research.splunk.com site code☆11Apr 10, 2024Updated last year
- Alternative password shadowing scheme☆10Feb 22, 2026Updated last week
- Network Shredder IDS☆11Aug 14, 2024Updated last year
- Sample SecOps scripts and Utilities☆12Jun 19, 2024Updated last year
- ☆12Jul 14, 2025Updated 7 months ago
- Flexible C# shellcode runner☆39Jan 18, 2022Updated 4 years ago
- this project can extract contact email address from many site.☆12Sep 26, 2021Updated 4 years ago
- ☆13Jun 29, 2023Updated 2 years ago
- string/file/shellcode encryptor using AES/XOR☆11Oct 15, 2023Updated 2 years ago
- Perform file-based malware scan on your on-prem servers with AWS☆14Oct 31, 2023Updated 2 years ago
- ☆40May 21, 2022Updated 3 years ago
- Federated Office365 user enumeration based on correlated response trend analysis☆49May 3, 2022Updated 3 years ago
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Jan 14, 2021Updated 5 years ago
- Small and highly portable detection tests based on MITRE's ATT&CK.☆10Feb 17, 2025Updated last year
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆12Oct 6, 2020Updated 5 years ago
- Script Center for System Center Configuration Manager☆12Jul 20, 2023Updated 2 years ago
- Simple KDMapper driver dumper. Unlike other dumpers, this dumper dumps the PE headers of the image too.☆16May 10, 2024Updated last year
- Remote Desktop Protocol .NET Console Application for Authenticated Command Execution☆12Jan 21, 2020Updated 6 years ago
- snake-core - the real snake☆15Jul 11, 2023Updated 2 years ago
- custom bloodhound queries and knowledge base☆12Apr 16, 2024Updated last year