Joystick is a tool that gives you the ability to transform the ATT&CK Evaluations data into concise views that brings forward the nuances in the results.
☆64Sep 13, 2023Updated 2 years ago
Alternatives and similar repositories for joystick
Users that are interested in joystick are comparing it to the libraries listed below
Sorting:
- A CALDERA plugin for ATT&CK Evaluations Round 1☆33Sep 14, 2023Updated 2 years ago
- Threat Report ATT&CK™ Mapping (TRAM) is a tool to aid analyst in mapping finished reports to ATT&CK.☆354Oct 6, 2021Updated 4 years ago
- A collection of scripts for dealing with Cobalt Strike beacons in Python☆169Jan 5, 2021Updated 5 years ago
- Lightweight In-App Web Application Firewall for PHP☆42Aug 26, 2020Updated 5 years ago
- [ARCHIVED] mov rax, ${Thalium/IceBox}; jmp rax;☆76Jun 8, 2019Updated 6 years ago
- Mock STIX data demonstrating the new data source representation☆16Sep 13, 2023Updated 2 years ago
- A collection of red team and adversary emulation resources developed and released by MITRE.☆534Apr 20, 2021Updated 4 years ago
- ☆98Oct 7, 2020Updated 5 years ago
- a State-Machine reversing exercise☆13Apr 22, 2021Updated 4 years ago
- Tradecraft Development Fundamentals☆40Aug 6, 2021Updated 4 years ago
- This extension provide a Python panel for writing custom proxy script.☆16Aug 26, 2019Updated 6 years ago
- Elemental - An ATT&CK Threat Library☆318Dec 8, 2022Updated 3 years ago
- ATT&CK Evaluations website (DEPRECATED)☆62Apr 30, 2021Updated 4 years ago
- Collection of resources related to the Center for Threat-Informed Defense☆77May 22, 2024Updated last year
- Re-play Security Events☆1,728Mar 20, 2024Updated 2 years ago
- DFIRTrack - The Incident Response Tracking Application☆533Jan 13, 2026Updated 2 months ago
- ☆12Feb 20, 2022Updated 4 years ago
- CARET - A tool for viewing cyber analytic relationships☆27Aug 21, 2020Updated 5 years ago
- Compilation of resources to help with Adversary Simulation automation harness☆100Aug 7, 2020Updated 5 years ago
- Scripts to automate standing up C2 infra with firewall settings inside of DigitalOcean.☆18Feb 5, 2021Updated 5 years ago
- Cloud Templates and scripts to deploy mordor environments☆129Mar 3, 2021Updated 5 years ago
- ☆13Dec 29, 2022Updated 3 years ago
- A full example report☆11Jul 23, 2019Updated 6 years ago
- Memory forensic tool for process resurrection starting from a memory dump☆20Jun 6, 2017Updated 8 years ago
- A tool to facilitate ROP Chain Development for XML Character Sanitization☆20May 9, 2019Updated 6 years ago
- Tools to rapidly deploy a threat hunting capability on Azure Sentinel that leverages Sysmon and MITRE ATT&CK☆1,080Nov 28, 2024Updated last year
- CVE-2020-1337 a bypass of (PrintDemon) CVE-2020-1048’s patch☆14Aug 11, 2020Updated 5 years ago
- Dynamic PowerShell Analysis Framework Based Upon PowerShell Debugging Functionality☆83Feb 18, 2023Updated 3 years ago
- Scripts and a (future) library to improve users' interactions with the ATT&CK content☆593Dec 11, 2023Updated 2 years ago
- A set of Zeek scripts to detect ATT&CK techniques.☆622Jun 26, 2024Updated last year
- webshell样本大合集。收集各种webshell用于webshell分析与发现。——www.shellpub.com☆224Mar 22, 2017Updated 8 years ago
- ☆25Jul 5, 2018Updated 7 years ago
- Slides(In both CN and EN) & WP(outdated) of my topic in HITCON 2019 about bug hunting in Android NFC☆15Aug 26, 2019Updated 6 years ago
- Encyclopedia for Executables☆473Nov 9, 2021Updated 4 years ago
- XSS payloads for edge cases☆34Nov 13, 2018Updated 7 years ago
- Some talks about security☆12Nov 20, 2020Updated 5 years ago
- Maltego transforms to pivot between PE files based on their VirusTotal codeblocks☆19Jul 15, 2021Updated 4 years ago
- ☆33Feb 26, 2022Updated 4 years ago
- dankAlerts is powered by Sysmon and Memes. Would you notice if a suspicious process was recorded in the event log?☆18Jun 24, 2020Updated 5 years ago