AI-powered cybersecurity attack flow visualization tool using MITRE ATT&CK
☆214Mar 4, 2026Updated last month
Alternatives and similar repositories for flowviz
Users that are interested in flowviz are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A tool for fetching DFIR and other GitHub tools.☆27Aug 2, 2025Updated 8 months ago
- A cross-platform tool to find traces of old SIDs remaining in LDAP objects of the Active Directory☆25Jun 29, 2025Updated 9 months ago
- KQLIntel is a browser-based tool that uses LLMs to convert threat intelligence reports into actionable Kusto Query Language (KQL) queries…☆30Aug 4, 2025Updated 8 months ago
- The home of the SDDLMaker☆29Jan 13, 2025Updated last year
- Playbook-NG is a stateless web-based application used to match incident findings with countermeasures for adversary containment and evict…☆159Mar 5, 2026Updated last month
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- 🛡️ SIGMA Detection Engineering Platform A comprehensive AI-powered detection engineering platform for security teams to explore MITRE AT…☆45Jun 28, 2025Updated 9 months ago
- ☆120May 26, 2025Updated 10 months ago
- Turn a supported list of filetypes (e.g. .docx) into a markdown structured text file. Also optionally defangs indicators and extract text…☆12Mar 17, 2026Updated 3 weeks ago
- A Windows tool that converts LDIF files to BloodHound CE☆31Dec 20, 2025Updated 3 months ago
- PowerShell SharePoint extraction + auditing tool for red/blue/purple teams. Enumerates all SharePoint sites/drives a user can access via …☆153Jan 25, 2026Updated 2 months ago
- A high-speed forensic timeline engine for Windows forensic artifact CSV output built for DFIR investigators. Quickly consolidate CSV outp…☆316Feb 26, 2026Updated last month
- ☆28Oct 15, 2025Updated 6 months ago
- Forensic tool for extracting and analyzing Google DriveFS cached files and metadata.☆20May 9, 2025Updated 11 months ago
- PowerShell-based Automation of Defender for Endpoint☆191Jul 3, 2025Updated 9 months ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Cmdlets for capturing Windows Events☆14Mar 11, 2022Updated 4 years ago
- Windows Forensics Environment Builder☆182Apr 7, 2026Updated last week
- Burp extension to track your current IP address. Extension focused for red teams where the attacker needs to log all used IP addresses.☆26Nov 2, 2025Updated 5 months ago
- This tool parses Windows EVTX logs to extract login and logout sessions from a security.evtx file. It uses a Tkinter GUI to let you selec…☆31Feb 22, 2025Updated last year
- CLI tools for forensic investigation of Windows artifacts☆350Jul 21, 2025Updated 8 months ago
- VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data …☆154Dec 26, 2025Updated 3 months ago
- Tools for Incident Response and Malware Analysis☆11Feb 9, 2025Updated last year
- AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE…☆1,218Dec 29, 2025Updated 3 months ago
- Manage and maintain Defender XDR custom collection configuration☆34Nov 19, 2025Updated 4 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Comprehensive Protection Against Deepfakes, Deepnudes & Harmful Content☆20Jan 3, 2026Updated 3 months ago
- The Eventlog Compendium is the go-to resource for understanding Windows Event Logs.☆54Apr 22, 2025Updated 11 months ago
- Outil de triage automatisé de différents types de collectes d'artefacts.☆18Dec 8, 2025Updated 4 months ago
- ☆59Dec 10, 2025Updated 4 months ago
- ☆100Apr 3, 2026Updated last week
- Have you ever wanted to search a link or IP address on multiple OSINT pages at once?☆61Jul 7, 2025Updated 9 months ago
- OID-See is an identity attack surface mapping tool that models OAuth trust, persistence, and impersonation paths in Entra using a graph-b…☆35Mar 31, 2026Updated 2 weeks ago
- Save toil in security operations with: Detection & Intelligence Analysis for New Alerts (D.I.A.N.A. )☆223Sep 4, 2024Updated last year
- AppLocker Policy Generator☆26Aug 25, 2025Updated 7 months ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Demonstrating 3 persistence layers from a single EXE, that converts itself into proxy DLLs at runtime☆80Mar 29, 2026Updated 2 weeks ago
- An introduction to detection engineering☆14Jan 3, 2025Updated last year
- Create local administrators with the SAMR API (lowest-level technique). Implemented in C#, Crystal, Python and Rust☆59Mar 7, 2026Updated last month
- Collection of scripts to automate the Malware Analysis process☆33Oct 27, 2025Updated 5 months ago
- Integrate LLM models directly into Ghidra for automated code refactoring and analysis.☆257Dec 16, 2025Updated 3 months ago
- Comprehensive adversary emulation tool for security testing on Google Cloud Platform (GCP) environments.☆14Jun 14, 2024Updated last year
- PowerShell tools to help defenders hunt smarter, hunt harder.☆479Oct 29, 2025Updated 5 months ago