ACT documentation repo
☆18May 22, 2024Updated last year
Alternatives and similar repositories for act
Users that are interested in act are comparing it to the libraries listed below
Sorting:
- Adversary Emulation Planner☆42Jan 9, 2026Updated 2 months ago
- eBPF-based EDR for Linux☆18Aug 25, 2024Updated last year
- Interface LLMs from within MISP to extract TTPs and threat intel from CTI reports☆18Nov 13, 2023Updated 2 years ago
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- ☆10Aug 3, 2019Updated 6 years ago
- ☆12Apr 26, 2018Updated 7 years ago
- Utility based on bpftool to manage eBPF maps☆14Jul 14, 2019Updated 6 years ago
- ☆14Sep 26, 2023Updated 2 years ago
- ☆10Jan 21, 2019Updated 7 years ago
- Go implementation of the Community ID flow hashing standard☆22Apr 17, 2025Updated 11 months ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Nov 26, 2016Updated 9 years ago
- Parsing MITRE EDR Evaluation results☆12Dec 5, 2018Updated 7 years ago
- Converts Sigma detection rules to a Splunk alert configuration.☆12Jul 1, 2021Updated 4 years ago
- A transformer that decodes swipes across a smartphone keyboard into words (gesture / swipe / glide typing) (enhanced yandex cup solution)☆15Feb 20, 2026Updated last month
- RENet is a deep learning tensorflow2.0 model for classify ATT&CK techniques and tactics for cyber threat intelligence with relevance enha…☆12Jan 11, 2023Updated 3 years ago
- Parser for Windows Scheduled Task files.☆13Apr 26, 2023Updated 2 years ago
- custom bloodhound queries and knowledge base☆12Apr 16, 2024Updated last year
- Basic Windows 32-bit debugger with special functions like directory monitoring and DLL injection☆14Mar 7, 2019Updated 7 years ago
- malware-encyclopedias is a set of tools to gather malware names and descriptions☆19May 19, 2016Updated 9 years ago
- Quantum Insert Backdoor POC☆11May 21, 2017Updated 8 years ago
- Short tutorial of how to install windows 11 via qemu☆17Mar 20, 2022Updated 4 years ago
- simple python IIS log parser☆11Apr 17, 2012Updated 13 years ago
- An automated phishing tool with 30+ templates. This Tool is made for educational purpose only ! Author will not be responsible for any mi…☆14Aug 21, 2024Updated last year
- Repository collecting and automagically processing public threat intelligence reports.☆19May 1, 2020Updated 5 years ago
- Allows you to add breakpoints from IDA (from the graph/text view) to WinDbg easily☆14Oct 10, 2018Updated 7 years ago
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Jun 12, 2022Updated 3 years ago
- No one writes dumb malware anymore. This is a repo for dumb malware.☆10Apr 18, 2017Updated 8 years ago
- verinice.veo is a cloud-native application for managing information security and data protection☆22Updated this week
- 北航2013年计算机夏令营机试题,2 problems written in C language,2013☆10Jul 21, 2015Updated 10 years ago
- ☆16Apr 16, 2017Updated 8 years ago
- OASIS-TAC-TC: OWL representation of the TAC TCs work products are maintained here. - https://github.com/oasis-tcs/tac-ontology☆16Oct 27, 2021Updated 4 years ago
- Windows stuff☆16Feb 5, 2020Updated 6 years ago
- RemotePSpy provides live monitoring of remote PowerShell sessions, which is particularly useful for older (pre-5.0) versions of PowerShel…☆19Mar 12, 2020Updated 6 years ago
- Packer images for Windows 10/11/2019/2022 - Suitable for QEMU and libvirt☆34Feb 29, 2024Updated 2 years ago
- fast, extensible, versatile event router for Suricata's EVE-JSON format☆57Nov 20, 2025Updated 4 months ago
- Maturity Model Collaborative project☆15Feb 27, 2023Updated 3 years ago
- ☆19Mar 31, 2019Updated 6 years ago
- A client for Hashicorp Vault written in TypeScript☆14Nov 20, 2023Updated 2 years ago
- A Python package for incremental backups of IMAP mailboxes☆16Oct 1, 2020Updated 5 years ago