jkb-s / snake-attackLinks
MITRE ATT&CK visualizations
☆12Updated 4 years ago
Alternatives and similar repositories for snake-attack
Users that are interested in snake-attack are comparing it to the libraries listed below
Sorting:
- Placeholder for my detection repo and misc detection engineering content☆42Updated 2 years ago
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆87Updated 3 years ago
- Simple PowerShell script to enable process scanning with Yara.☆98Updated 3 years ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆105Updated 3 years ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆74Updated 4 years ago
- Triaging Windows event logs based on SANS Poster☆44Updated 2 months ago
- ☆69Updated 4 years ago
- A Python package is used to execute Atomic Red Team tests (Atomics) across multiple operating system environments.☆137Updated last year
- ☆28Updated 4 years ago
- Linux Evidence Acquisition Framework☆119Updated last year
- Ransomware Simulator for testing Blue Team Detections☆39Updated 3 years ago
- Really can protect from ransomware encryption?☆47Updated last year
- Fraktal's Ransomware Emulator☆101Updated last year
- See adversary, do adversary: Simple execution of commands for defensive tuning/research (now with more ELF on the shelf)☆107Updated 2 years ago
- A collection of useful PowerShell tools to collect, organize, and visualize Sysmon event data☆39Updated 5 years ago
- Bloodhound Portable for Windows☆53Updated 2 years ago
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆74Updated 3 weeks ago
- Learning volatility plugins.☆18Updated 4 years ago
- A home for detection content developed by the delivr.to team☆73Updated 5 months ago
- Carbon Black Response IR tool☆55Updated 5 years ago
- IOC Collection 2022☆57Updated 2 years ago
- ☆66Updated 4 years ago
- Library of threat hunts to get any user started!☆48Updated 5 years ago
- Active C2 IoCs☆99Updated 3 years ago
- My conference presentations☆87Updated 2 months ago
- Rules Shared by the Community from 100 Days of YARA 2023☆78Updated 2 years ago
- ☆44Updated 6 months ago
- Python API for interacting with sigma rules.☆54Updated 3 years ago
- An exercise to practice deobfuscating PowerShell Scripts.☆26Updated 2 years ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆117Updated 4 years ago