michenriksen / dia-attacktreeLinks
Attack Tree modeling sheet for Dia
☆20Updated 7 years ago
Alternatives and similar repositories for dia-attacktree
Users that are interested in dia-attacktree are comparing it to the libraries listed below
Sorting:
- DNS Enumeration and Reconnaissance Tool☆36Updated 9 years ago
- dawg the hallway monitor - monitor operating system changes and analyze introduced attack surface when installing software☆55Updated 6 years ago
- ☆50Updated 9 years ago
- My personal experience in Threat Hunting and knowledge gained so far.☆19Updated 8 years ago
- ☆52Updated 7 years ago
- Traceroute improved wrapper for CSIRT and CERT operators☆39Updated last year
- BTG's purpose is to make fast and efficient search on IOC☆71Updated 7 years ago
- Scoring Engine for CTF competitions☆48Updated 2 years ago
- Home to the ActorTrackr source code☆24Updated 8 years ago
- Vulnerability Assessment and Auditing Framework for all the Crypto Implementations.☆37Updated 9 years ago
- threat-intelligence.eu website and repository of information about open standards, documents, methodologies and processes in threat intel…☆49Updated last month
- Plugins written for CVE-Search☆27Updated 4 years ago
- A warehouse for your malware☆135Updated last month
- SMB Auto authentication Vulnerability☆34Updated 9 years ago
- Clustering NMAP XML results to help make sense of large scan results.☆33Updated 3 years ago
- Malware Classifier From Network Captures☆82Updated 8 years ago
- A script to track malware IOCs with OSINT on Twitter.☆54Updated last year
- VPS infrastructure found in HT dumps☆26Updated 10 years ago
- Modular tool to test exfiltration techniques.☆37Updated 8 years ago
- Common Vulnerabilities and Exposures - Portal. Archived and now replaced by vulnerability-lookup.org☆87Updated 9 months ago
- Passive Network Audit Framework☆32Updated 7 years ago
- Sorta reverse implementation of ShoVAT - Also includes NMAP banner regex results☆16Updated 7 years ago
- This repository is a curated list of pro bono incident response entities.☆21Updated 2 years ago
- A scoreboard for Security CTF events☆37Updated 13 years ago
- The ContactDB project was initiated to cover the need for a tool to maintain contacts for CSIRT teams☆37Updated 3 years ago
- SensePost's network footprinting and enumeration tool. You can't pwn what you don't know about.☆43Updated 11 years ago
- A small wriiteup and a PoC tool about how to use SO_REUSADDR for firewall evasion☆27Updated 10 years ago
- Artefacts from various retefe campaigns☆10Updated 6 years ago
- Deploy MISP Project software with Vagrant.☆45Updated 5 years ago
- POLAR☆74Updated 6 years ago