hellocosmos / mitre-attck-suricata-automationView external linksLinks
Mitre ATT&CK and Suricata Rules Automation with AI & LLM
☆14Sep 28, 2024Updated last year
Alternatives and similar repositories for mitre-attck-suricata-automation
Users that are interested in mitre-attck-suricata-automation are comparing it to the libraries listed below
Sorting:
- ☆32Oct 16, 2025Updated 4 months ago
- Repository of creating different example suricata data sets☆37Jan 2, 2019Updated 7 years ago
- Script for automating multiple word files to be used with Hashcat☆11Apr 9, 2024Updated last year
- ☆11Feb 8, 2026Updated last week
- ☆12Aug 15, 2024Updated last year
- Reverse engineered the villager pypi package to github repo for analysis☆26Sep 20, 2025Updated 4 months ago
- ☆12Aug 10, 2024Updated last year
- A Rust library along with a Win32 GUI application to determine the driver load order of a Windows system (cf. https://colinfinck.de/posts…☆12Jan 26, 2025Updated last year
- Send Emails using Bash in Synology☆12Jul 1, 2023Updated 2 years ago
- My personal website with ai feature and blog☆19Jan 2, 2026Updated last month
- Collection of malware ioc hashes from blog posts. A Python script is provided to search through it.☆19Sep 10, 2020Updated 5 years ago
- A Sigma based detection pipeline☆13Dec 15, 2023Updated 2 years ago
- ☆10Apr 29, 2025Updated 9 months ago
- suricata rules to pcap☆10Mar 25, 2021Updated 4 years ago
- 一个各类漏洞POC知识库☆10Jul 17, 2023Updated 2 years ago
- Kubernetes Watcher☆12Feb 6, 2023Updated 3 years ago
- A collection of notes and rules (Snort/Suricata, Sigma, and YARA) to identify various samples of malware.☆14Sep 7, 2021Updated 4 years ago
- Notepad++ Syntax Highlighting for Languages Used by Cyber Security Professionals☆14May 31, 2020Updated 5 years ago
- Send your expenses to a telegram bot and it will automatically insert the data to your google spreadsheet.☆13May 24, 2020Updated 5 years ago
- 一个基于golang的简单漏洞扫描器☆12Feb 2, 2024Updated 2 years ago
- red or blue☆14Apr 20, 2023Updated 2 years ago
- ☆11Jun 12, 2023Updated 2 years ago
- ☆13Feb 25, 2021Updated 4 years ago
- ☆10Sep 24, 2025Updated 4 months ago
- Common password lists, filtered by complexity and length policy.☆16Sep 22, 2021Updated 4 years ago
- Repo of General Conference addresses☆11Oct 9, 2025Updated 4 months ago
- Parse Suricata rules☆13Aug 1, 2023Updated 2 years ago
- Windows priviledge escalation script☆13Feb 1, 2025Updated last year
- Kaze's openly available CVE vulnerability data.☆15Apr 7, 2025Updated 10 months ago
- The demo of hidden process and ko module☆22Nov 24, 2022Updated 3 years ago
- A simple way of detecting multithreaded exfiltration in Zeek.☆15May 1, 2025Updated 9 months ago
- ☆12Dec 23, 2021Updated 4 years ago
- ☆11Mar 2, 2024Updated last year
- 各种安全相关思维导图整理收集☆11Feb 13, 2017Updated 9 years ago
- Contoh realtime app dengan Laravel websockets.☆10Mar 10, 2019Updated 6 years ago
- 轻松构建自定义GPT助手,GPTStore。☆13Apr 30, 2023Updated 2 years ago
- This script will not work with the latest version of chrome☆13May 11, 2025Updated 9 months ago
- ☆13Jun 26, 2022Updated 3 years ago
- A Framework to Automatically Extract Indicators of Compromise (IoCs) from Twitter☆16Dec 9, 2019Updated 6 years ago