Web app that provides basic navigation and annotation of ATT&CK matrices
☆60Nov 22, 2019Updated 6 years ago
Alternatives and similar repositories for attack-navigator
Users that are interested in attack-navigator are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Splunk App for MITRE Att&CK Navigator(TM)☆23Mar 25, 2021Updated 4 years ago
- Web app that provides basic navigation and annotation of ATT&CK matrices☆2,348Updated this week
- MISP sighting server is a fast sighting server to store and look-up sightings on attributes (network indicators, file hashes, system indi…☆15Dec 24, 2023Updated 2 years ago
- ☆30Nov 15, 2018Updated 7 years ago
- ☆12Jan 5, 2021Updated 5 years ago
- A dockerized version of the sof-elk project☆13Jul 1, 2020Updated 5 years ago
- Compilation of resources to help with Adversary Simulation automation harness☆100Aug 7, 2020Updated 5 years ago
- Indices for courses in SANS' Network Security Operations curriculum☆17Feb 5, 2016Updated 10 years ago
- ☆19Oct 30, 2020Updated 5 years ago
- A web application to streamline the development of STIGs from SRGs☆85Mar 6, 2026Updated 2 weeks ago
- Personal repository with handy cheatsheets.☆16Oct 23, 2016Updated 9 years ago
- Simplified go-cat agent for caldera☆11Dec 18, 2023Updated 2 years ago
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Feb 6, 2024Updated 2 years ago
- ☆22Sep 16, 2025Updated 6 months ago
- InSpec Profile to validate the secure configuration of aws-rds-infrastructure-cis-baseline, against CIS's Amazon Web Services Three-tier …☆14Dec 14, 2025Updated 3 months ago
- Scripts I have made for blue team☆16Apr 1, 2018Updated 7 years ago
- An AWS Pentesting tool that lets you use one-liner commands to backdoor an AWS account's resources with a rogue AWS account - or share th…☆14Feb 16, 2021Updated 5 years ago
- A CALDERA plugin☆18Jul 28, 2020Updated 5 years ago
- A series of GPO templates☆21Jan 2, 2017Updated 9 years ago
- MITRE ATT&CK Windows Logging Cheat Sheets☆348Nov 8, 2018Updated 7 years ago
- ☆10May 29, 2023Updated 2 years ago
- Utilities for MITRE™ ATT&CK☆1,050Jan 3, 2026Updated 2 months ago
- Windows Forensics Salt States☆21Updated this week
- PowerShell script to report the membership of Exchange RBAC role groups☆10Oct 21, 2018Updated 7 years ago
- All sysmon event types and their fields explained☆566Nov 13, 2021Updated 4 years ago
- Risk Based Alerting Supporting Add-On (SA) for Splunk☆44Oct 28, 2021Updated 4 years ago
- Allows to pull asset and identity data into Splunk app for Enterprise Security from LDAP and other sources☆28Feb 23, 2018Updated 8 years ago
- ELF Sectional docking payload injector system☆21Jun 28, 2022Updated 3 years ago
- Crack base64(sha256(username)) hash from Microsoft Event ID 1029☆24Aug 4, 2023Updated 2 years ago
- Cyber Threat Intelligence Repository expressed in STIX 2.0☆2,040Dec 19, 2025Updated 3 months ago
- Linux integrity monitoring for CentOS/RHEL☆13May 13, 2020Updated 5 years ago
- InSpec profile for Microsoft Windows 10, against DISA's Microsoft Windows 10 Security Technical Implementation Guide (STIG) Version 1, Re…☆15Jan 9, 2025Updated last year
- A tool to list the SSH clone URLs for all GitHub repos for a given user☆14Feb 7, 2016Updated 10 years ago
- A collaborative CISSP notes card☆39Dec 20, 2015Updated 10 years ago
- DEFCON Furs Badge Software for DC27 (2019)☆23Jan 4, 2020Updated 6 years ago
- A toolset to make a system look as if it was the victim of an APT attack☆2,722Sep 23, 2025Updated 6 months ago
- Popular Ransomware file extensions☆27Jan 16, 2026Updated 2 months ago
- Recursively validate a starting directory of file contents to identify changes, corrupt data☆37Jul 28, 2020Updated 5 years ago
- Hundred Days of Yara Challenge☆12Jun 21, 2022Updated 3 years ago