ATT&CK技战术数据
☆15Feb 8, 2021Updated 5 years ago
Alternatives and similar repositories for ATTCK-technical-data
Users that are interested in ATTCK-technical-data are comparing it to the libraries listed below
Sorting:
- ☆12Dec 26, 2017Updated 8 years ago
- eqgrp-auction decrypted☆13Apr 15, 2017Updated 8 years ago
- ☆17Aug 23, 2023Updated 2 years ago
- Static and Dynamic exploit analysis framework.☆23Jul 14, 2014Updated 11 years ago
- autoType enable☆36Sep 21, 2019Updated 6 years ago
- 一个基于openresty开发的安全网关demo☆30Mar 3, 2022Updated 4 years ago
- PHP extension for web-application dynamic analysis.☆27Sep 21, 2018Updated 7 years ago
- Meer is a "spooler" for Suricata / Sagan.☆30Jun 21, 2023Updated 2 years ago
- A dataset containing APT group related articles and MITRE ATT&CK technique descriptions☆18Aug 14, 2019Updated 6 years ago
- A Sigma based detection pipeline☆12Dec 15, 2023Updated 2 years ago
- ☆10Jul 5, 2020Updated 5 years ago
- ☆11Jun 11, 2025Updated 9 months ago
- A free standalone software that enables end-users to detect country, region, city, latitude, longitude, ZIP code, ISP, domain name, timez…☆21Dec 31, 2025Updated 2 months ago
- ☆10Sep 24, 2025Updated 5 months ago
- Matt's DFIR blog☆14Jul 28, 2025Updated 7 months ago
- 基于 BOW 和 TF-IDF 的简易 QA 匹配模型(智能客服)☆19Jan 23, 2019Updated 7 years ago
- Baseline IoT security checklist. Consider security as early in development as possible and reap the rewards.☆30Aug 25, 2017Updated 8 years ago
- A collection of notes and rules (Snort/Suricata, Sigma, and YARA) to identify various samples of malware.☆14Sep 7, 2021Updated 4 years ago
- Simple socket-based gateway to the Burp Collaborator☆34Nov 23, 2016Updated 9 years ago
- Software project☆12Jun 21, 2022Updated 3 years ago
- ☆13Feb 25, 2021Updated 5 years ago
- Advanced Vulnerable Web Application (AVWA)☆14Jun 10, 2017Updated 8 years ago
- Frontend to import Nmap Scan in ES, and frontend to make search☆10Nov 16, 2014Updated 11 years ago
- 安全编排与自动化响应平台☆62Dec 16, 2020Updated 5 years ago
- Open source tools mentioned in Advanced Penetration Testing Hacking the World's Most Secure Networks☆11Feb 12, 2018Updated 8 years ago
- Windows Syslog Command Line Client☆15Nov 21, 2012Updated 13 years ago
- Infosec Compilation is an information security repository for offensive, defensive, and purple-teaming resources, along with guides desig…☆23Dec 14, 2022Updated 3 years ago
- suricata rules to pcap☆10Mar 25, 2021Updated 4 years ago
- 基于LSTM的恶意域名检测实例☆21Apr 3, 2020Updated 5 years ago
- Upload Fuzzer for Burpsuite☆17Aug 23, 2018Updated 7 years ago
- 发信平台自动化部署☆65Jun 6, 2020Updated 5 years ago
- ☆12May 17, 2023Updated 2 years ago
- 记录整理日常java安全分析代码☆14Dec 25, 2018Updated 7 years ago
- creddump bypass AV☆42Nov 6, 2020Updated 5 years ago
- Parse Suricata rules☆14Aug 1, 2023Updated 2 years ago
- This repository contains OpenIOC rules to aid in hunting for indicators of compromise and TTPs focused on Advanced Persistent Threat grou…☆26Oct 3, 2023Updated 2 years ago
- smb爆破工具☆19May 7, 2021Updated 4 years ago
- ATT&CK 框架图中文翻译版 原为安恒奖品,自我二次翻译,修改了一些小的翻译错误问题,自我保存即可☆262Jan 15, 2020Updated 6 years ago
- 复现过的AI安全检测的项目集合☆45Oct 20, 2019Updated 6 years ago