AI-powered cybersecurity attack flow visualization tool using MITRE ATT&CK
☆214Mar 4, 2026Updated 3 weeks ago
Alternatives and similar repositories for flowviz
Users that are interested in flowviz are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A tool for fetching DFIR and other GitHub tools.☆26Aug 2, 2025Updated 7 months ago
- A cross-platform tool to find traces of old SIDs remaining in LDAP objects of the Active Directory☆25Jun 29, 2025Updated 8 months ago
- KQLIntel is a browser-based tool that uses LLMs to convert threat intelligence reports into actionable Kusto Query Language (KQL) queries…☆29Aug 4, 2025Updated 7 months ago
- The home of the SDDLMaker☆28Jan 13, 2025Updated last year
- Playbook-NG is a stateless web-based application used to match incident findings with countermeasures for adversary containment and evict…☆157Mar 5, 2026Updated 2 weeks ago
- 🛡️ SIGMA Detection Engineering Platform A comprehensive AI-powered detection engineering platform for security teams to explore MITRE AT…☆45Jun 28, 2025Updated 8 months ago
- A Windows tool that converts LDIF files to BloodHound CE☆31Dec 20, 2025Updated 3 months ago
- ☆120May 26, 2025Updated 9 months ago
- Invoke-AtomicAssessment is a powerful tool designed to facilitate adversary emulation by leveraging Atomic Red Team.☆47Jan 22, 2025Updated last year
- Turn a supported list of filetypes (e.g. .docx) into a markdown structured text file. Also optionally defangs indicators and extract text…☆12Mar 17, 2026Updated last week
- A high-speed forensic timeline engine for Windows forensic artifact CSV output built for DFIR investigators. Quickly consolidate CSV outp…☆309Feb 26, 2026Updated 3 weeks ago
- Velociraptor Server hosted in Azure App Service☆59Jun 4, 2025Updated 9 months ago
- ☆28Oct 15, 2025Updated 5 months ago
- Forensic tool for extracting and analyzing Google DriveFS cached files and metadata.☆20May 9, 2025Updated 10 months ago
- Cmdlets for capturing Windows Events☆14Mar 11, 2022Updated 4 years ago
- Windows Forensics Environment Builder☆180Dec 5, 2025Updated 3 months ago
- Super light, super fast, unlimited search idea☆25Aug 3, 2025Updated 7 months ago
- Burp extension to track your current IP address. Extension focused for red teams where the attacker needs to log all used IP addresses.☆26Nov 2, 2025Updated 4 months ago
- Project based on RegRipper, to extract add'l value/pivot points from TLN events file☆89Feb 9, 2025Updated last year
- This tool parses Windows EVTX logs to extract login and logout sessions from a security.evtx file. It uses a Tkinter GUI to let you selec…☆31Feb 22, 2025Updated last year
- CLI tools for forensic investigation of Windows artifacts☆349Jul 21, 2025Updated 8 months ago
- VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data …☆154Dec 26, 2025Updated 2 months ago
- OID-See is an identity attack surface mapping tool that models OAuth trust, persistence, and impersonation paths in Entra using a graph-b…☆33Jan 19, 2026Updated 2 months ago
- Tools for Incident Response and Malware Analysis☆11Feb 9, 2025Updated last year
- AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE…☆1,206Dec 29, 2025Updated 2 months ago
- Manage and maintain Defender XDR custom collection configuration☆34Nov 19, 2025Updated 4 months ago
- The Eventlog Compendium is the go-to resource for understanding Windows Event Logs.☆54Apr 22, 2025Updated 11 months ago
- AppLocker Policy Generator☆26Aug 25, 2025Updated 7 months ago
- ☆59Dec 10, 2025Updated 3 months ago
- Create local administrators with the SAMR API (lowest-level technique). Implemented in C#, Crystal, Python and Rust☆57Mar 7, 2026Updated 2 weeks ago
- ☆100Oct 22, 2025Updated 5 months ago
- Have you ever wanted to search a link or IP address on multiple OSINT pages at once?☆59Jul 7, 2025Updated 8 months ago
- An introduction to detection engineering☆14Jan 3, 2025Updated last year
- Collection of scripts to automate the Malware Analysis process☆33Oct 27, 2025Updated 4 months ago
- PowerShell tools to help defenders hunt smarter, hunt harder.☆476Oct 29, 2025Updated 4 months ago
- AISA-Scanner is an AI-powered autonomous vulnerability scanner that maps CVEs to metasploit exploits, MITRE, CEH, and SANS, delivering in…☆33Jul 31, 2025Updated 7 months ago
- Comprehensive adversary emulation tool for security testing on Google Cloud Platform (GCP) environments.☆14Jun 14, 2024Updated last year
- MCP to help Defenders Detection Engineer Harder and Smarter☆340Mar 5, 2026Updated 2 weeks ago
- macOS Artifacts☆33Mar 2, 2025Updated last year