An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository contains a TAXII 2.1 API integration for the ATT&CK Workbench application.
☆46Feb 13, 2026Updated 2 months ago
Alternatives and similar repositories for attack-workbench-taxii-server
Users that are interested in attack-workbench-taxii-server are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆55Updated this week
- Scripts and outputs for ATLAS data in STIX JSON and ATT&CK Navigator layer formats☆27Mar 31, 2026Updated 2 weeks ago
- ATT&CK Data Model (ADM): A TypeScript library for structured interaction with MITRE ATT&CK datasets. Uses Zod schemas, TypeScript types, …☆73Feb 17, 2026Updated last month
- OASIS Cyber Threat Intelligence (CTI) TC: A tool for generating STIX content for prototyping and testing. https://github.com/oasis-open/c…☆43Apr 15, 2024Updated last year
- A python module for working with ATT&CK☆684Apr 1, 2026Updated last week
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Near Real-Time Bolide Detection Engine☆21Updated this week
- STIX data representing MITRE ATT&CK☆553Dec 23, 2025Updated 3 months ago
- TAXII 2.0 Server implemented in Node JS with MongoDB backend☆12Jan 3, 2023Updated 3 years ago
- TAXII server implementation in Python from EclecticIQ☆213Mar 12, 2026Updated last month
- Unicode Security Toolkit☆21Updated this week
- ☆20Dec 19, 2017Updated 8 years ago
- Convert your spreadsheet or CSV for the GIAC exam to a more compact index. Inspired by Voltaire and usable offline.☆21Jun 6, 2025Updated 10 months ago
- Fake license server for MalwareBytes.☆18Jan 10, 2021Updated 5 years ago
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆13Apr 30, 2021Updated 4 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- My Gitbook CyberSec Notes☆21Oct 22, 2025Updated 5 months ago
- A project designed to make the operationalization of open-source cyber threat intelligence more efficient.☆17Updated this week
- ☆19Oct 2, 2022Updated 3 years ago
- A python steganography module to store messages or files protected with AES-256 encryption inside an image.☆10Jan 18, 2022Updated 4 years ago
- Sightings Ecosystem gives cyber defenders visibility into what adversaries actually do in the wild. With your help, we are tracking MITRE…☆38May 28, 2025Updated 10 months ago
- Defending IaaS with ATT&CK is a project to create a collection of ATT&CK techniques relevant to a Linux IaaS environment, as well as a me…☆14May 28, 2025Updated 10 months ago
- Automating Cyber Threat Intelligence Reporting with Natural Language Generation☆15Jan 24, 2024Updated 2 years ago
- ☆18Oct 8, 2024Updated last year
- A web API for various cyber threat intelligence frameworks, including MITRE ATT&CK, CWE, ATLAS...☆19Updated this week
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆15Aug 12, 2024Updated last year
- Methods for attacking KeePass 2.X databases, including extracting of encryption key material from memory.☆11Apr 2, 2022Updated 4 years ago
- pagodo (Passive Google Dork) - Automate Google Hacking Database scraping and searching☆12Jun 4, 2022Updated 3 years ago
- Support in Delphi for WebP and Heif image codecs with a wrapper for the DLLs.☆15Mar 6, 2025Updated last year
- ☆10Aug 11, 2025Updated 8 months ago
- A sample media Android app works on Quest devices, in both Android 2D Panel Mode and Immersive Mode supported by Meta Spatial SDK.☆11Jun 18, 2025Updated 9 months ago
- ☆12Oct 12, 2013Updated 12 years ago
- All about ransomware notes and extension files.☆14Aug 26, 2023Updated 2 years ago
- Введение в разработку вредоносных программ☆12Oct 15, 2023Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Tracking and documenting monthly insights about hacktivist coalitions.☆23Sep 14, 2025Updated 7 months ago
- Regain device access if denied/disabled by other programs (esp. device control programs, ransomware)☆12Dec 13, 2019Updated 6 years ago
- Generic Signature Format for SIEM Systems☆14Oct 27, 2021Updated 4 years ago
- A MITRE Caldera plugin☆50Mar 18, 2026Updated 3 weeks ago
- This is the code used in a tutorial called "Build a Discord bot with Rust and Serenity"☆10Sep 29, 2020Updated 5 years ago
- a drop-in replacement for Nmap powered by shodan.io☆10Apr 5, 2022Updated 4 years ago
- Automated network asset, email, and social media profile discovery and cataloguing.☆13Jan 6, 2022Updated 4 years ago