mitre / stockpileView external linksLinks
A CALDERA plugin
☆80Feb 6, 2026Updated last week
Alternatives and similar repositories for stockpile
Users that are interested in stockpile are comparing it to the libraries listed below
Sorting:
- A CALDERA plugin☆72Updated this week
- A CALDERA plugin☆18Jul 28, 2020Updated 5 years ago
- A MITRE Caldera plugin☆49Oct 6, 2025Updated 4 months ago
- Simplified go-cat agent for caldera☆11Dec 18, 2023Updated 2 years ago
- Proof of concept implementation of a cyber threat intelligence and incident handling platform☆11Feb 10, 2023Updated 3 years ago
- Python-based cloud node for local use☆11Mar 7, 2018Updated 7 years ago
- A CALDERA plugin for autonomous incident response☆27Oct 6, 2025Updated 4 months ago
- Public Repo for Atomic Test Harness☆283Apr 8, 2025Updated 10 months ago
- Compilation of resources to help with Adversary Simulation automation harness☆100Aug 7, 2020Updated 5 years ago
- Repository for my ATT&CK analysis research.☆71May 16, 2019Updated 6 years ago
- This CALDERA Plugin converts Adversary Emulation Plans from the Center for Threat Informed Defense☆34Oct 7, 2025Updated 4 months ago
- Python bindings for Yeti's API☆19Sep 12, 2023Updated 2 years ago
- A datasource assessment on an event level to show potential coverage or the MITRE ATT&CK framework☆355Nov 3, 2020Updated 5 years ago
- Bloodhound agent for Mythic☆23Apr 19, 2025Updated 9 months ago
- Qemuno Framework☆24Sep 8, 2022Updated 3 years ago
- ☆22Jun 9, 2025Updated 8 months ago
- An elevated STIX representation of the MITRE ATT&CK Groups knowledge base☆23May 23, 2022Updated 3 years ago
- Attack Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by devel…☆713Nov 14, 2025Updated 3 months ago
- Theat hunting notes in flat file format and mapped to MITRE's ATT&CK IDs☆43Oct 21, 2018Updated 7 years ago
- This content is analysis and research of the data sources currently listed in ATT&CK.☆415Sep 13, 2023Updated 2 years ago
- Use SQL to instantly query file, domain, URL and IP scanning results from VirusTotal.☆23Oct 13, 2025Updated 4 months ago
- A CALDERA plugin☆26Oct 6, 2025Updated 4 months ago
- MAD ATT&CK Defender: ATT&CK Adversary Emulation Repository☆127Apr 24, 2023Updated 2 years ago
- Pathfinder is a plugin for mapping network vulnerabilities, scanned by CALDERA or imported by a supported network scanner, and translatin…☆128Apr 3, 2025Updated 10 months ago
- powershell script i wrote that can suspend an arbitrary process (with limits)☆22Mar 26, 2023Updated 2 years ago
- A proof of concept for a clickjacking attack on macOS.☆97Feb 12, 2024Updated 2 years ago
- The ContactDB project was initiated to cover the need for a tool to maintain contacts for CSIRT teams☆37Jan 21, 2022Updated 4 years ago
- Nemesis agent for Mythic☆28Dec 11, 2025Updated 2 months ago
- The Event Maturity Matrix (EMM) is a comprehensive framework that provides clarity regarding the capabilities and nuances of SaaS audit l…☆30Jun 21, 2025Updated 7 months ago
- JavaScript for Automation (JXA) tool to do Active Directory enumeration.☆106Feb 19, 2022Updated 3 years ago
- CASCADE Server☆274Dec 8, 2022Updated 3 years ago
- An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.☆2,073May 28, 2025Updated 8 months ago
- ☆46Oct 27, 2023Updated 2 years ago
- Cobalt Strike log state tracking, parsing, and storage☆24Jul 18, 2019Updated 6 years ago
- the most basic DLL ever to pop a cmd.☆24Jul 11, 2020Updated 5 years ago
- Slides and POC demo for my talk at Divizion Zero on EDR evasion titled "Evasion Adventures"☆31Jan 14, 2023Updated 3 years ago
- A Python package is used to execute Atomic Red Team tests (Atomics) across multiple operating system environments.☆137Jul 17, 2024Updated last year
- Remote Desktop Protocol .NET Console Application for Authenticated Command Execution☆12Jan 21, 2020Updated 6 years ago
- Terraform playbook of a vulnerable Azure deployment☆10Apr 28, 2022Updated 3 years ago