Principles of MITRE ATT&CK in the fraud domain
☆35Apr 14, 2019Updated 6 years ago
Alternatives and similar repositories for attck4fraud
Users that are interested in attck4fraud are comparing it to the libraries listed below
Sorting:
- These are exploits created to avoid the use of Metasploit. While studying for OSCP in the Offsec labs, VHL, Vulnhub, etc, I tried to find…☆32Jul 31, 2025Updated 7 months ago
- This repository is a curated list of pro bono incident response entities.☆21Jun 21, 2023Updated 2 years ago
- Plugins written for CVE-Search☆27Apr 16, 2021Updated 4 years ago
- Artefacts from various retefe campaigns☆10Mar 9, 2019Updated 7 years ago
- Enables dynamic translation of structured data between formats☆14Dec 14, 2018Updated 7 years ago
- Methodoloy for pentesting web applications.☆10Aug 18, 2022Updated 3 years ago
- python tools to assist in penetration testing☆14Jan 19, 2026Updated last month
- Economics of Ransomware | Dataset☆15May 2, 2018Updated 7 years ago
- This project contains code for comparing or ranking APT capabilities and operational capacity. The metrics are meant to quantify, rank, o…☆35Feb 27, 2019Updated 7 years ago
- ☆14May 30, 2018Updated 7 years ago
- Script for pulling events from a MISP database and converting them to Autofocus queries.☆13Dec 28, 2015Updated 10 years ago
- Automated OpenDXL Output information via IntelMQ☆14Jul 20, 2017Updated 8 years ago
- This module installs and configures MISP (Malware Information Sharing Platform)☆14Dec 29, 2025Updated 2 months ago
- Python libary to normalize Yara signatures☆19Oct 9, 2020Updated 5 years ago
- Network white noise collector☆19Mar 23, 2016Updated 9 years ago
- Simple python wrapper for the Robtex API (see https://www.robtex.com/api/).☆13Apr 17, 2021Updated 4 years ago
- A collection of Python utilities for use in scripts related to working with "indicators of compromise" (IOCs).☆16Dec 19, 2018Updated 7 years ago
- Malware campaigns and APTs research by BlackArrow☆19Apr 30, 2020Updated 5 years ago
- A browser extension that seamlessly integrates your yara match notifications into VirusTotal Intelligence.☆17Feb 8, 2015Updated 11 years ago
- Docker kinsing malware bitcoin/xmr miner☆23Feb 18, 2021Updated 5 years ago
- Utilizing your Threat data from a MISP instance into CarbonBlack Response by exposing the data in the Threat Intelligence Feed.☆20May 25, 2022Updated 3 years ago
- Epimitheus is a tool that uses graphical database Neo4j for Windows Events visualization.☆19Mar 13, 2022Updated 3 years ago
- Scripts for OSCE☆18Dec 28, 2018Updated 7 years ago
- ☆19Sep 2, 2018Updated 7 years ago
- Materials used in preperation for the BSCP certification from PortSwigger☆18Jan 28, 2022Updated 4 years ago
- A simple python library to assist in working with cpes☆19Jan 30, 2024Updated 2 years ago
- A REST API server for yara event notifications. Mapping file hashes to yara signatures in Elasticsearch for easy hash lookup or finding h…☆19May 12, 2015Updated 10 years ago
- Creating a Feed of MISP Events from ThreatFox (by abuse.ch)☆19Jun 2, 2021Updated 4 years ago
- SightingDB is a database for Sightings☆22Jun 21, 2023Updated 2 years ago
- Ops-Trust Platform - Portal☆21Aug 5, 2016Updated 9 years ago
- CTF Writeup including upsolve / Hack The Box Writeup☆21Jul 29, 2025Updated 7 months ago
- STIX Visualization Tool☆110Jul 13, 2018Updated 7 years ago
- yara rules for cryptography detection☆31Apr 28, 2014Updated 11 years ago
- Parse Yara rules and operate over them more easily.☆51Jan 7, 2019Updated 7 years ago
- An Exploration into Graph Databases☆28Oct 7, 2015Updated 10 years ago
- Identifies phishing websites using a treebag model☆22Oct 14, 2020Updated 5 years ago
- PRECISELY PINPOINT PEDO LOCATION THROUGH THE ART OF SOCIAL ENGINEERING☆26Apr 10, 2025Updated 10 months ago
- Mattermost - Shodan Slash command☆31Jan 25, 2017Updated 9 years ago
- References for FIRST CTI 2019 Symposium presentation☆23Mar 19, 2019Updated 6 years ago