jhainly / det3ct-the-att-ckView external linksLinks
SIEM Detection Use Case Library mapped to MITRE ATT&CK tactics and techniques
☆12Oct 28, 2018Updated 7 years ago
Alternatives and similar repositories for det3ct-the-att-ck
Users that are interested in det3ct-the-att-ck are comparing it to the libraries listed below
Sorting:
- just manipulatin these here tokens yes sir nothing weird☆22Apr 18, 2022Updated 3 years ago
- Crypto coin ticker counter for Reddit comments.☆10Dec 1, 2021Updated 4 years ago
- ☆22Jul 26, 2021Updated 4 years ago
- A simple demo project of cmake and google protocol buffer.☆10Dec 3, 2013Updated 12 years ago
- Android pin cracker☆13Mar 25, 2022Updated 3 years ago
- FAUCET is an OpenFlow controller for multi table OpenFlow 1.3 switches, that implements layer 2 switching, VLANs, ACLs, and layer 3 IPv4 …☆14Nov 18, 2019Updated 6 years ago
- WPScan is a black box WordPress vulnerability scanner.☆10Oct 6, 2017Updated 8 years ago
- Redmine, Pomodoro.app and Todo-txt. Together.☆33Feb 21, 2017Updated 8 years ago
- Translates SQL queries to MongoDB queries.☆11Jun 15, 2017Updated 8 years ago
- ☆10Dec 31, 2014Updated 11 years ago
- Email OSINT and password breach hunting. Use h8mail to find passwords through different breach and reconnaissance services, or the infamo…☆10Jun 12, 2019Updated 6 years ago
- compare shell command vs sql ppt☆13Jun 19, 2013Updated 12 years ago
- An agent that performs user actions on a workstation☆12Jan 22, 2018Updated 8 years ago
- Easily watermark your identity card photo to protect privacyProvide watermarking to documents and ID photos to ensure that the document i…☆12Dec 10, 2022Updated 3 years ago
- PE Injection with ring3 hook bypass☆10May 3, 2021Updated 4 years ago
- Want to automate you or your patient's treatments in a novel way we haven't thought of? TOP APIs make it trivial to expand or change func…☆11Mar 1, 2019Updated 6 years ago
- [DEPRECATED] An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This r…☆13Aug 16, 2023Updated 2 years ago
- ☆12Jul 15, 2018Updated 7 years ago
- Code to push data from file into the kafka☆12Mar 27, 2018Updated 7 years ago
- FOMU keystroke injector☆12Aug 7, 2023Updated 2 years ago
- Plugin that serves the ATT&CK website alongside CALDERA.☆12Feb 24, 2020Updated 5 years ago
- Code from Chris Valasek @nudehaberdasher and Charlie Miller @0xcharlie car hack: http://blog.ioactive.com/2013/08/car-hacking-content.ht…☆14Oct 1, 2020Updated 5 years ago
- My latest setup configs.☆10Aug 7, 2016Updated 9 years ago
- Simple python tool to search http://ixirc.com/☆10Apr 16, 2019Updated 6 years ago
- A simple code for detects Host header vulnerability☆12Feb 18, 2020Updated 6 years ago
- Example of Realtime Celery Task Monitoring using Flask-SocketIO☆11Aug 25, 2014Updated 11 years ago
- free book in Chinese "Master Perl Today"☆23May 24, 2013Updated 12 years ago
- CUPP - Common User Passwords Profiler !☆15Jun 14, 2024Updated last year
- 專題論文☆10Jul 27, 2013Updated 12 years ago
- ☆13Jul 30, 2021Updated 4 years ago
- Web-based shell written in PHP☆12Aug 27, 2018Updated 7 years ago
- Collection of Best Python Projects !☆11Jan 3, 2023Updated 3 years ago
- Simple GridFS capabilities built on node-mongodb-native.☆31Jun 15, 2013Updated 12 years ago
- Under Your Radar (UYR): Exfiltration using Steganography☆18Mar 28, 2015Updated 10 years ago
- End of Life - Nethunter AIO for s7 and s7 Edge☆11Aug 10, 2021Updated 4 years ago
- Website searcher for SEO comparisons / OSINT☆11Oct 13, 2019Updated 6 years ago
- Python module to interact with THOR Thunderstorm service☆17Dec 5, 2025Updated 2 months ago
- Amassing wealth in the form of biochemical tactical nuclear hack precision strike notes for existential fulfillment and destruction of th…☆12Feb 19, 2022Updated 3 years ago
- ☆14Jan 5, 2024Updated 2 years ago