center-for-threat-informed-defense / attack-syncView external linksLinks
ATT&CK Sync is a Center for Threat-Informed Defense project that aims to improve the ability for organizations to consume MITRE ATT&CK® version updates into their internal systems and processes.
☆24Dec 5, 2025Updated 2 months ago
Alternatives and similar repositories for attack-sync
Users that are interested in attack-sync are comparing it to the libraries listed below
Sorting:
- Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogue…☆88Jan 28, 2026Updated 2 weeks ago
- Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. The research…☆55Updated this week
- A list of IOCs applicable to PoshC2☆24Aug 3, 2020Updated 5 years ago
- How to bypass your Bell Aliant provided modems.☆12Feb 2, 2026Updated last week
- Download domain data from the Centralized Zone Database Service☆16May 17, 2025Updated 8 months ago
- RRR (Rapid Response Reporting) is a collection of Incident Response Report objects. They are designed to help incident responders provid…☆37Apr 6, 2022Updated 3 years ago
- Automated pipeline for downloading, staging, ingesting, and investigating leaked and declassified archives (DDoSecrets, National Security…☆31Sep 22, 2025Updated 4 months ago
- ☆10Jul 24, 2023Updated 2 years ago
- A Simple CTFd Plugin that will act as a flag generator and validator☆13Nov 23, 2023Updated 2 years ago
- Blackcert monitors Certificate Transparency Logs for a keyword. Blackcert collects any certificate changes for this keyword and also chec…☆10Dec 8, 2022Updated 3 years ago
- ASN Lookup Generator for Splunk☆10Jan 24, 2024Updated 2 years ago
- Minimalistic WebUI for passiveDNS tool☆18May 6, 2021Updated 4 years ago
- Create a gist from your current directory contents.☆10Aug 7, 2016Updated 9 years ago
- A small CTFd plugin to send notifications about solves and admin announcements to Slack/Discord/Telegram☆13Oct 20, 2021Updated 4 years ago
- A quick way to perform a bulk whois query. Utilizes Team Cymru's service. Requires netcat.☆11Feb 11, 2012Updated 14 years ago
- A web adaptation of the social deduction board game Secret Hitler. This fork includes work to run the application using docker-compose.☆11Jul 28, 2025Updated 6 months ago
- Here are some tools I developed to help analyze malware☆11Nov 8, 2023Updated 2 years ago
- ☆12Jun 12, 2023Updated 2 years ago
- Threat Hunting Malware Infrastructure☆11Dec 3, 2023Updated 2 years ago
- PowerShell scripts to aid investigators when utilizing O365 and Magnet Axiom.☆12Aug 26, 2024Updated last year
- Extract LPD/LPR print job(s) from wireshark capture file☆12May 2, 2023Updated 2 years ago
- An Android app that allows the RingMyPhone Pebble app to wake your Android phone up and start it ringing so you can find it.☆16Feb 13, 2022Updated 4 years ago
- Sensor Mappings to ATT&CK is a collection of resources to assist cyber defenders with understanding which sensors and events can help det…☆50Jun 21, 2025Updated 7 months ago
- ☆11Mar 12, 2021Updated 4 years ago
- LLM prompt attacks for hacker CTFs via CTFd.☆15Dec 17, 2023Updated 2 years ago
- Turn a supported list of filetypes (e.g. .docx) into a markdown structured text file. Also optionally defangs indicators and extract text…☆12Feb 5, 2026Updated last week
- OpenFaaS function that returns SSL/TLS certificate information for a given URL☆12Sep 21, 2020Updated 5 years ago
- Fetch all Honeypot☆12Oct 3, 2018Updated 7 years ago
- A Python package that implements common AI techniques used in videogames, meant to be used with PyGame☆12Jun 10, 2019Updated 6 years ago
- nfsinkhole is a Python library and scripts for setting up a Linux server as a sinkhole (monitor, log/capture, and drop all traffic to a s…☆12Apr 8, 2017Updated 8 years ago
- A fork which adds a UI to the original deep-research tool☆11Feb 8, 2025Updated last year
- Docker config for a very small nginx container☆12Jan 22, 2022Updated 4 years ago
- /ˈhäjˌpäj/ "a confused mixture."☆13Updated this week
- Graphical model of a TCP/IP stack which can be used as a cheatsheet when developing BPF filters.☆16Dec 10, 2019Updated 6 years ago
- my MSTICpy practice and custom tools repository☆11Apr 23, 2025Updated 9 months ago
- Faust Streaming engine for simple keyword domain monitoring☆13Apr 24, 2020Updated 5 years ago
- An interactive world-map that has been used in live Cyber Threat interfaces☆13Jul 31, 2021Updated 4 years ago
- R3D SSH Hunter: The Ultimate SSH Key and Bad Guy Tracker☆12Nov 5, 2024Updated last year
- Cloud Analytics helps defenders detect attacks to their cloud infrastructure by developing behavioral analytics for cloud platforms as we…☆54Apr 25, 2023Updated 2 years ago