Adversary Emulation Planner
☆41Jan 9, 2026Updated 3 months ago
Alternatives and similar repositories for provreq
Users that are interested in provreq are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ACT documentation repo☆17May 22, 2024Updated last year
- DGA Detective - Hunt domains generated by Domain Generation Algorithms to identify malware traffic☆45Aug 3, 2024Updated last year
- An active domain name query tool to help keep track of domain name movements...☆16Mar 28, 2021Updated 5 years ago
- A detailed list of potentially dangerous file extensions☆18Jun 18, 2025Updated 9 months ago
- An elevated STIX representation of the MITRE ATT&CK Groups knowledge base☆23May 23, 2022Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Identify synthetic domain names using Random Forrest Classifier☆13Jun 4, 2024Updated last year
- Analytics for Accounting logs from Network devices☆18Mar 27, 2021Updated 5 years ago
- ☆10Apr 8, 2018Updated 8 years ago
- Phishing attack identification tool - Performs email risk evaluations relying on different black lists, machine learning techniques, and …☆18Feb 27, 2023Updated 3 years ago
- Volatility memory forensics plugin for extracting Windows DNS Cache☆29Mar 13, 2017Updated 9 years ago
- Specification for OmniBOR, reproducible identifiers & fine-grained build dependency tracking for software artifacts.☆26Nov 17, 2025Updated 4 months ago
- Reproducible and extensible BloodHound playbooks☆44Jan 20, 2020Updated 6 years ago
- Deep Learning for Domain Name System☆19Jan 14, 2022Updated 4 years ago
- SACTI - Securely aggregate CTI sightings and report them on MISP☆14Oct 24, 2022Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- DGA-generated domain detection using deep learning models☆23Nov 21, 2022Updated 3 years ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Jul 13, 2022Updated 3 years ago
- Small utility script to notify via Slack about Hashcat's progress during a password cracking session☆10Mar 10, 2019Updated 7 years ago
- Cloud Analytics helps defenders detect attacks to their cloud infrastructure by developing behavioral analytics for cloud platforms as we…☆54Apr 25, 2023Updated 2 years ago
- Kibana app for RedELK☆18Mar 19, 2023Updated 3 years ago
- Specifications used in the MISP project including MISP core format☆53Jan 7, 2026Updated 3 months ago
- Caldera plugin to deploy "humans" to emulate user behavior on systems☆31Mar 18, 2026Updated 3 weeks ago
- Extract the Procedures (TTP) from CTI reports☆18Dec 13, 2025Updated 3 months ago
- ☆21Feb 6, 2024Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ShellSweeping the evil.☆53Jun 18, 2024Updated last year
- Malware.lu configuration extractor☆26Mar 27, 2014Updated 12 years ago
- A Canary which fires when uninstalled☆34Mar 16, 2021Updated 5 years ago
- Slightly modified version of https://raw.githubusercontent.com/killswitch-GUI/CobaltStrike-ToolKit/master/HTTPsC2DoneRight.sh☆12Nov 16, 2017Updated 8 years ago
- A proof of concept implementation of the Siemens S7 protocol analyser for the Bro IDS.☆16Mar 26, 2017Updated 9 years ago
- ☆15Oct 29, 2024Updated last year
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆11Nov 24, 2023Updated 2 years ago
- API to access the Redis database of a BGP Ranking instance.☆17Dec 11, 2017Updated 8 years ago
- AIL project training materials☆39Feb 24, 2026Updated last month
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ☆16May 13, 2021Updated 4 years ago
- A set of scripts to assist you in creating "a partner in communication"☆11Feb 18, 2025Updated last year
- Harness the security superpowers of your cloud asset inventory☆11Sep 22, 2024Updated last year
- Augmentation to Machine Readable CTI☆39Sep 9, 2025Updated 7 months ago
- a simple powershell wrapper to automate checking a user's access around the network☆13Dec 5, 2023Updated 2 years ago
- SightingDB is a database for Sightings☆22Jun 21, 2023Updated 2 years ago
- A Docker container for Cowrie - SSH honeypot based on kippo☆11Jun 1, 2015Updated 10 years ago