Principles of MITRE ATT&CK in the fraud domain
☆35Apr 14, 2019Updated 6 years ago
Alternatives and similar repositories for attck4fraud
Users that are interested in attck4fraud are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- These are exploits created to avoid the use of Metasploit. While studying for OSCP in the Offsec labs, VHL, Vulnhub, etc, I tried to find…☆32Jul 31, 2025Updated 7 months ago
- Comprehensive guide to AI applications in OSINT workflows and intelligence analysis☆50Jul 14, 2025Updated 8 months ago
- A collection of personal ZAP scripts☆13Apr 10, 2023Updated 2 years ago
- This repository is a curated list of pro bono incident response entities.☆21Jun 21, 2023Updated 2 years ago
- This project contains code for comparing or ranking APT capabilities and operational capacity. The metrics are meant to quantify, rank, o…☆35Feb 27, 2019Updated 7 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Threat Box Assessment Tool☆19Mar 5, 2026Updated 3 weeks ago
- ☆14May 30, 2018Updated 7 years ago
- Pentest utils☆14Oct 8, 2016Updated 9 years ago
- Looks up details on a public IPV4 address against ip-info and blacklist-search sites. Providing a reputation check.☆11Oct 16, 2021Updated 4 years ago
- A streamlined way to create STIX documents!☆31Apr 30, 2014Updated 11 years ago
- domain name/brand infringement detector. pulls newly registered domains daily, searches variations of your company domain names and alert…☆23Feb 22, 2022Updated 4 years ago
- A REST API server for yara event notifications. Mapping file hashes to yara signatures in Elasticsearch for easy hash lookup or finding h…☆19May 12, 2015Updated 10 years ago
- Vulnerabilities, security advisories, exploit codes and proof-of-concept codes.☆10Mar 1, 2026Updated 3 weeks ago
- Script for pulling events from a MISP database and converting them to Autofocus queries.☆13Dec 28, 2015Updated 10 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Plugins written for CVE-Search☆27Apr 16, 2021Updated 4 years ago
- Enables dynamic translation of structured data between formats☆14Dec 14, 2018Updated 7 years ago
- ☆40Jun 3, 2021Updated 4 years ago
- Draugnet is a lightweight, open-source tool for anonymous cyber threat reporting. Built for the MISP ecosystem, it lets users submit and …☆20Updated this week
- ☆13Feb 29, 2020Updated 6 years ago
- A collection of Python utilities for use in scripts related to working with "indicators of compromise" (IOCs).☆16Dec 19, 2018Updated 7 years ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Jan 4, 2023Updated 3 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 7 years ago
- Automated OpenDXL Output information via IntelMQ☆14Jul 20, 2017Updated 8 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Creating a Feed of MISP Events from ThreatFox (by abuse.ch)☆19Jun 2, 2021Updated 4 years ago
- checks site content against known good ssdeep hash, identifies matches☆10Jun 2, 2019Updated 6 years ago
- ☆12Jun 20, 2023Updated 2 years ago
- A collection of tools to work on username:password combo lists☆15Oct 28, 2022Updated 3 years ago
- Utilities for decrypting and hashing SolarWinds Orion credentials☆14Oct 25, 2018Updated 7 years ago
- Dark Reader Chrome and Firefox extension☆12Jul 7, 2019Updated 6 years ago
- ☆12Jan 1, 2025Updated last year
- Epimitheus is a tool that uses graphical database Neo4j for Windows Events visualization.☆19Mar 13, 2022Updated 4 years ago
- Community maintained list of most popular HIPS service and process names on a Windows Platform.☆43Jan 7, 2026Updated 2 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- This module installs and configures MISP (Malware Information Sharing Platform)☆14Mar 6, 2026Updated 3 weeks ago
- Utilizing your Threat data from a MISP instance into CarbonBlack Response by exposing the data in the Threat Intelligence Feed.☆20May 25, 2022Updated 3 years ago
- SightingDB is a database for Sightings☆22Jun 21, 2023Updated 2 years ago
- Organizar documentos sobre OSINT feitos em pt-br☆21Dec 20, 2023Updated 2 years ago
- Script darkfb v1.9 (login akses token).☆10Mar 4, 2023Updated 3 years ago
- A parser for arbitarily-formatted dates/times.☆17Dec 27, 2017Updated 8 years ago
- Threat Report ATT&CK™ Mapping (TRAM) is a tool to aid analyst in mapping finished reports to ATT&CK.☆354Oct 6, 2021Updated 4 years ago