hrbrmstr / attckrLinks
⚔️MITRE ATT&CK Machinations in R
☆23Updated 5 years ago
Alternatives and similar repositories for attckr
Users that are interested in attckr are comparing it to the libraries listed below
Sorting:
- R interface to the Censys "cyber"/scans search engine • https://www.censys.io/tutorial☆14Updated 3 years ago
- MITRE package gives you an approach to cybersecurity data sets.☆18Updated 2 years ago
- Useful tools for working with the PassiveTotal API in R☆13Updated 9 years ago
- Analyst tool for creating pivot maps of data sources☆17Updated 8 years ago
- ☆46Updated last year
- R package to work with the Shodan API☆17Updated 7 years ago
- ATT&CK Evaluations website (DEPRECATED)☆59Updated 4 years ago
- Analyze and Visualize Data from Modern Honey Network Servers with R☆15Updated 9 years ago
- Query 'GreyNoise Intelligence 'API' in R☆14Updated 5 years ago
- Bluehat 2018 Graphs for Security Workshop☆42Updated 6 years ago
- Mapping the ATT&CK matrix in a Cowrie honeypot☆16Updated 7 years ago
- Threat Mapping Catalogue☆17Updated 4 years ago
- Historical list of {Cobalt Strike,NanoHTTPD} servers☆121Updated 6 years ago
- 👀 Analyze Websites and Resources They Request☆24Updated 6 years ago
- A tool to assess data quality, built on top of the awesome OSSEM.☆78Updated 3 years ago
- ☆53Updated 6 years ago
- Real Time Threat Monitoring Tool☆112Updated 2 years ago
- Security R package with a set of utils to analyse the different industry standards (MITRE and NIST).☆12Updated 6 years ago
- Tools to work with the Google DNS over HTTPS API in R☆25Updated 5 years ago
- Mapping NSM rules to MITRE ATT&CK☆72Updated 5 years ago
- Joystick is a tool that gives you the ability to transform the ATT&CK Evaluations data into concise views that brings forward the nuances…☆64Updated 2 years ago
- References for FIRST CTI 2019 Symposium presentation☆23Updated 6 years ago
- A CALDERA plugin for ATT&CK Evaluations Round 1☆33Updated 2 years ago
- The new name is DeTT&CT☆24Updated 6 years ago
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆103Updated 2 months ago
- Historical Observations of Actionable Reputation Data☆13Updated 7 years ago
- Understanding ATT&CK Matrix for Enterprise☆80Updated 7 years ago
- Mitre Att&ck Technique Emulation☆82Updated 6 years ago
- Malicious actors often reuse code to deploy their malware, phishing website or CNC server. As a result, similiaries can be found on URLs …☆75Updated last year
- How to Zeek Sysmon Logs!☆102Updated 3 years ago