Joystick is a tool that gives you the ability to transform the ATT&CK Evaluations data into concise views that brings forward the nuances in the results.
☆64Sep 13, 2023Updated 2 years ago
Alternatives and similar repositories for joystick
Users that are interested in joystick are comparing it to the libraries listed below
Sorting:
- A CALDERA plugin for ATT&CK Evaluations Round 1☆33Sep 14, 2023Updated 2 years ago
- Memory forensic tool for process resurrection starting from a memory dump☆20Jun 6, 2017Updated 8 years ago
- ☆98Oct 7, 2020Updated 5 years ago
- Lightweight In-App Web Application Firewall for PHP☆42Aug 26, 2020Updated 5 years ago
- A collection of scripts for dealing with Cobalt Strike beacons in Python☆169Jan 5, 2021Updated 5 years ago
- a State-Machine reversing exercise☆13Apr 22, 2021Updated 4 years ago
- ☆12Feb 20, 2022Updated 4 years ago
- This extension provide a Python panel for writing custom proxy script.☆16Aug 26, 2019Updated 6 years ago
- Slides(In both CN and EN) & WP(outdated) of my topic in HITCON 2019 about bug hunting in Android NFC☆15Aug 26, 2019Updated 6 years ago
- Threat Report ATT&CK™ Mapping (TRAM) is a tool to aid analyst in mapping finished reports to ATT&CK.☆356Oct 6, 2021Updated 4 years ago
- dankAlerts is powered by Sysmon and Memes. Would you notice if a suspicious process was recorded in the event log?☆18Jun 24, 2020Updated 5 years ago
- ☆17Apr 20, 2022Updated 3 years ago
- Elemental - An ATT&CK Threat Library☆318Dec 8, 2022Updated 3 years ago
- [ARCHIVED] mov rax, ${Thalium/IceBox}; jmp rax;☆76Jun 8, 2019Updated 6 years ago
- XSS payloads for edge cases☆34Nov 13, 2018Updated 7 years ago
- A tool to facilitate ROP Chain Development for XML Character Sanitization☆20May 9, 2019Updated 6 years ago
- Re-play Security Events☆1,723Mar 20, 2024Updated last year
- Maltego transforms to pivot between PE files based on their VirusTotal codeblocks☆19Jul 15, 2021Updated 4 years ago
- A collection of red team and adversary emulation resources developed and released by MITRE.☆531Apr 20, 2021Updated 4 years ago
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆38Feb 16, 2020Updated 6 years ago
- Tradecraft Development Fundamentals☆40Aug 6, 2021Updated 4 years ago
- New Found 0-days!☆36Dec 4, 2019Updated 6 years ago
- Collection of resources related to the Center for Threat-Informed Defense☆76May 22, 2024Updated last year
- Tools to rapidly deploy a threat hunting capability on Azure Sentinel that leverages Sysmon and MITRE ATT&CK☆1,078Nov 28, 2024Updated last year
- DFIRTrack - The Incident Response Tracking Application☆532Jan 13, 2026Updated last month
- Automatically create YARA rules from malicious documents.☆211May 16, 2022Updated 3 years ago
- ☆99Sep 15, 2025Updated 5 months ago
- ☆50Sep 11, 2019Updated 6 years ago
- Continuous kerberoast monitor☆45Aug 24, 2023Updated 2 years ago
- ☆65Jul 3, 2024Updated last year
- A modern Python-3-based alternative to RegRipper☆205Mar 31, 2025Updated 11 months ago
- webshell样本大合集。收集各种webshell用于webshell分析与发现。——www.shellpub.com☆224Mar 22, 2017Updated 8 years ago
- Mock STIX data demonstrating the new data source representation☆16Sep 13, 2023Updated 2 years ago
- The code in this repository which function is to extract the shellcode from the maldoc.☆10Jul 17, 2023Updated 2 years ago
- Some YARA rules i will add from time to time☆12May 31, 2019Updated 6 years ago
- DeTT&CT Editor☆12Jan 21, 2026Updated last month
- OASIS Cyber Threat Intelligence (CTI) TC: A tool for generating STIX content for prototyping and testing. https://github.com/oasis-open/c…☆43Apr 15, 2024Updated last year
- Cloud Templates and scripts to deploy mordor environments☆129Mar 3, 2021Updated 4 years ago
- ☆25Jul 5, 2018Updated 7 years ago