This provides a guided step by step walkthrough for threat modeling with MITRE ATT&CK Framework
☆30Jan 7, 2026Updated 2 months ago
Alternatives and similar repositories for mitreattackthreatmodeling
Users that are interested in mitreattackthreatmodeling are comparing it to the libraries listed below
Sorting:
- nTask is a distributed task management program that allows you to distribute tasks across multiple computers using API communication and …☆16Feb 19, 2026Updated 2 weeks ago
- buldDNS: A DNS scanner for large-scale measurement☆22Jan 22, 2026Updated last month
- M áquina virtual para investigaciones en fuentes abiertas OSINT☆17Oct 4, 2024Updated last year
- Caido's passive workflow to find potential leaked secrets, PII, and sensitive fields.☆20Jan 13, 2025Updated last year
- BadExclusions is a tool to identify folder custom or undocumented exclusions on AV/EDR☆21Feb 8, 2024Updated 2 years ago
- Repository of Volatility3 plugins☆22Mar 22, 2023Updated 2 years ago
- Contains All tools i Use For Red Team OPs in Windows Environment. NOTE: I am not the Creator Of these tools. These are the tools i use.☆19Aug 11, 2022Updated 3 years ago
- Fork Threat Modeling Platform - Community☆27Oct 10, 2025Updated 4 months ago
- SMB password sprayer☆20Jan 19, 2019Updated 7 years ago
- ☆26Jan 27, 2022Updated 4 years ago
- ☆27Apr 22, 2025Updated 10 months ago
- Remove duplicate URLs by retaining only the unique combinations of hostname, path, and parameter names☆39May 5, 2024Updated last year
- A complete system to deploy functional Honeypots to all infrastructures that needs to be notified when something anomalous occur☆10Feb 8, 2022Updated 4 years ago
- Collection of scripts/resources/ideas for attack surface reduction and additional logging to enable better threat hunting on Windows endp…☆38Apr 5, 2024Updated last year
- Hunt SSL Certificates for interesting keywords on major cloud service providers / internet☆40Nov 20, 2025Updated 3 months ago
- The fastest stacked-branch workflow for Git. Interactive TUI, smart PRs, safe undo. Written in Rust.☆58Updated this week
- An automation framework for CyberSecurity Tools☆12Dec 6, 2025Updated 3 months ago
- ☆11Updated this week
- A security assessment tool for Hitachi Vantara's Pentaho Business Analytics platform.☆13Oct 31, 2021Updated 4 years ago
- Nmapurls parses Nmap xml reports from either piped input or command line arg and outputs a list of http(s) URL's to be used in an automat…☆43Jun 15, 2025Updated 8 months ago
- SLSA Proposals☆11Jan 29, 2024Updated 2 years ago
- Packet Analysis on Steroids☆13Oct 20, 2022Updated 3 years ago
- Recordization library☆11Feb 27, 2026Updated last week
- Mimicry is a dynamic deception tool that actively deceives an attacker during exploitation and post-exploitation.☆60Jun 26, 2023Updated 2 years ago
- Mass Assigner is a simple tool made to probe for mass assignment vulnerability through JSON field modification in HTTP requests☆17Jun 22, 2024Updated last year
- ☆13Aug 17, 2020Updated 5 years ago
- Honeypot detection toolkit☆11Feb 10, 2026Updated 3 weeks ago
- Payloads for the Hak5 Bash Bunny☆13May 23, 2019Updated 6 years ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- ☆13Mar 1, 2024Updated 2 years ago
- [MIRROR] Templates and scripts to provide Windows and Linux machines with packer and vagrant☆10May 10, 2025Updated 9 months ago
- Processing Traefik logs by splitting them into separate folders based on the "ServiceName" field (e.g., "9-service@http") and implementin…☆16Apr 20, 2025Updated 10 months ago
- ☆12Feb 18, 2022Updated 4 years ago
- A small pentesting lab for Azure☆10Apr 19, 2019Updated 6 years ago
- Movie Streaming Platform☆18Feb 24, 2026Updated last week
- ☆11Dec 25, 2020Updated 5 years ago
- My Arch Linux setup for a lean, secure, command-line driven development environment with modular configuration management using shell scr…☆10Jan 22, 2023Updated 3 years ago
- A static code analyzer to generate network connection topology for micro-service applications☆18Mar 2, 2026Updated last week
- Kubernetes Master Class: A Seamless Approach to Rancher & Kubernetes Upgrades☆11May 30, 2022Updated 3 years ago