ATT&CK Powered Suit is a browser extension that puts the complete MITRE ATT&CK® knowledge base at your fingertips with text search, context menus, and ATT&CK Navigator integration.
☆82Mar 19, 2026Updated last month
Alternatives and similar repositories for attack-powered-suit
Users that are interested in attack-powered-suit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Repository containing malware analysis filters for the Windows SysInternals' - Process Monitor tool☆21Oct 2, 2020Updated 5 years ago
- TIE is a machine learning model for inferring associated MITRE ATT&CK techniques from previously observed techniques.☆70Apr 19, 2025Updated last year
- CARET - A tool for viewing cyber analytic relationships☆27Aug 21, 2020Updated 5 years ago
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆287Mar 20, 2025Updated last year
- Crackme challenge☆17Nov 20, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.☆16May 21, 2021Updated 4 years ago
- Firepit - STIX Columnar Storage☆18Jun 5, 2024Updated last year
- Reads and prints information from the website MalAPI.io☆20Jul 14, 2022Updated 3 years ago
- OSSEM Data Dictionaries☆65Jan 22, 2025Updated last year
- Documentation and tools to curate Sigma rules for Windows event logs into easier to parse rules.☆15Oct 22, 2025Updated 5 months ago
- ☆21Nov 19, 2025Updated 5 months ago
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆415Updated this week
- Collects a listing of MITRE ATT&CK Techniques, then discovers Splunk ESCU detections for each technique☆69Mar 17, 2024Updated 2 years ago
- ☆10Aug 9, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆17Oct 13, 2025Updated 6 months ago
- pySigma Splunk backend☆41Mar 22, 2026Updated 3 weeks ago
- C & Shellcode Playground..☆10Dec 2, 2017Updated 8 years ago
- Attack Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by devel…☆727Nov 14, 2025Updated 5 months ago
- Sightings Ecosystem gives cyber defenders visibility into what adversaries actually do in the wild. With your help, we are tracking MITRE…☆38May 28, 2025Updated 10 months ago
- OASIS TC Open Repository: The repository cti-stix-slider supports development of a Python application to convert STIX 2.0 content to STIX…☆22Apr 12, 2024Updated 2 years ago
- A completely unsupported set of scripts used in SANS FOR572, Advanced Network Forensics and Analysis☆28Aug 6, 2025Updated 8 months ago
- Easily scan with multiple yara rules from different sources.☆14Mar 9, 2024Updated 2 years ago
- Writing Your Own Ticket to the Cloud Like APT: A Deep-dive to AD FS Attacks, Detections, and Mitigations☆12Dec 9, 2022Updated 3 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- ☆16Dec 5, 2023Updated 2 years ago
- ☆15Sep 24, 2024Updated last year
- Script for automating Linux memory capture and analysis☆13May 6, 2020Updated 5 years ago
- Threat Alert Logic Repository☆93Feb 7, 2019Updated 7 years ago
- Translate STIX 2 Patterning Queries☆31Oct 4, 2018Updated 7 years ago
- Set of EVTX samples (>270) mapped to MITRE ATT&CK tactic and techniques to measure your SIEM coverage or developed new use cases.☆621Dec 8, 2025Updated 4 months ago
- Resources To Learn And Understand SIGMA Rules☆184Feb 14, 2023Updated 3 years ago
- unix_collector is a Live Response collection script for Incident Response on UNIX-like systems using native binaries. Supports AIX, Andro…☆42Jun 10, 2025Updated 10 months ago
- Klara docker compose☆11May 19, 2020Updated 5 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Web app that provides basic navigation and annotation of ATT&CK matrices☆2,355Apr 10, 2026Updated last week
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆55Apr 11, 2026Updated last week
- Suricata rules for network anomaly detection☆182Feb 7, 2026Updated 2 months ago
- The principal objective of this project is to develop a knowledge base of the tactics, techniques, and procedures (TTPs) used by insiders…☆152Jul 9, 2025Updated 9 months ago
- A Feature Rich Modular Malware Configuration Extraction Utility for MalDuck☆132Nov 25, 2023Updated 2 years ago
- Top ATT&CK Techniques helps defenders approach the breadth and complexity of MITRE ATT&CK® with a prioritized top 10 list of techniques t…☆123May 28, 2025Updated 10 months ago
- OASIS TC Open Repository: Lightweight visualization for STIX 2.0 objects and relationships☆162Jan 19, 2026Updated 2 months ago