This was code for analyzing round 1 of the MITRE Enterprise ATT&CK Evaluation. Please check out https://github.com/joshzelonis/EnterpriseAPT29Eval for round 2 information.
☆94Apr 22, 2020Updated 5 years ago
Alternatives and similar repositories for attack-eval-scoring
Users that are interested in attack-eval-scoring are comparing it to the libraries listed below
Sorting:
- Powershell - web traffic whitenoise generator☆47Jun 4, 2020Updated 5 years ago
- ☆26Jun 22, 2022Updated 3 years ago
- Applied Purple Teaming - (ITOCI4hr) - Infrastructure, Threat Optics, and Continuous Improvement - June 6, 2020☆323Jan 22, 2021Updated 5 years ago
- The PoLRBear Project☆35Mar 12, 2021Updated 4 years ago
- All my slides for any talks☆23Oct 13, 2024Updated last year
- Presentation materials for talks I've given.☆20Oct 14, 2019Updated 6 years ago
- Bloodhound Reporting for Blue and Purple Teams☆1,277Nov 15, 2025Updated 3 months ago
- Beacon Kibana Executable Report. Aggregates Sysmon Network Events With Elasticsearch and Kibana☆299Feb 9, 2026Updated 2 weeks ago
- Bro things..☆15Oct 23, 2015Updated 10 years ago
- Cypher for Defenders: Leveraging Bloodhound Data Beyond the UI☆26Feb 8, 2024Updated 2 years ago
- ☆133Mar 10, 2021Updated 4 years ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,516Jan 12, 2026Updated last month
- Exporting MISP event attributes to yara rules usable with Thor apt scanner☆24Mar 27, 2017Updated 8 years ago
- Knowledge base of analytics designed to cover threats based on MITRE's ATT&CK.☆23Dec 13, 2018Updated 7 years ago
- Helps with finding and registering categorized domains☆70May 6, 2021Updated 4 years ago
- A Pastebin scraper designed to look for malicious content☆20Nov 20, 2019Updated 6 years ago
- Passive service locator, a python sniffer that identifies servers, clients, names and much more☆258Feb 9, 2026Updated 2 weeks ago
- Volatility 3 Plugins☆21Oct 3, 2022Updated 3 years ago
- ☆537Feb 19, 2026Updated last week
- ☆57May 13, 2020Updated 5 years ago
- Mapping your datasources and detections to the MITRE ATT&CK Navigator framework.☆58May 25, 2020Updated 5 years ago
- Automatic Sender Policy Framework Reconnaissance☆19Jul 9, 2018Updated 7 years ago
- Cloud Templates and scripts to deploy mordor environments☆129Mar 3, 2021Updated 4 years ago
- An Active Defense and EDR software to empower Blue Teams☆1,316Aug 10, 2023Updated 2 years ago
- Purple Teaming Attack & Hunt Lab - Terraform☆163Nov 29, 2021Updated 4 years ago
- Port of Mandiant ShellcodeHashes plugin from IDA to BinaryNinja☆11Jul 24, 2024Updated last year
- Auxiliary scripts for Incident Response with ELK☆11Oct 7, 2015Updated 10 years ago
- HoneyDB Python Module☆14Feb 6, 2024Updated 2 years ago
- Re-play Security Events☆1,723Mar 20, 2024Updated last year
- ThreatHunt is a PowerShell repository that allows you to train your threat hunting skills.☆135Jul 25, 2019Updated 6 years ago
- Zeek package to generate a SMB client fingerprint☆27May 5, 2020Updated 5 years ago
- Detect Tactics, Techniques & Combat Threats☆2,263Jan 21, 2026Updated last month
- Collection of walkthroughs on various threat hunting techniques☆76Aug 3, 2020Updated 5 years ago
- A list of IOCs applicable to PoshC2☆24Aug 3, 2020Updated 5 years ago
- maldev obviously☆28May 5, 2025Updated 9 months ago
- Investigate malicious Windows logon by visualizing and analyzing Windows event log☆3,138Oct 19, 2025Updated 4 months ago
- A datasource assessment on an event level to show potential coverage or the MITRE ATT&CK framework☆355Nov 3, 2020Updated 5 years ago
- This program exports MITRE ATT&CK framework in ELK dashboard☆80Dec 8, 2022Updated 3 years ago
- Parsing MITRE EDR Evaluation results☆12Dec 5, 2018Updated 7 years ago