Adversary Emulation Planner
☆42Jan 9, 2026Updated 2 months ago
Alternatives and similar repositories for provreq
Users that are interested in provreq are comparing it to the libraries listed below
Sorting:
- CERTITUDE - A python package to classify malicious URLs☆20May 16, 2022Updated 3 years ago
- DGA Detective - Hunt domains generated by Domain Generation Algorithms to identify malware traffic☆45Aug 3, 2024Updated last year
- SNIcat☆128Aug 19, 2021Updated 4 years ago
- An active domain name query tool to help keep track of domain name movements...☆16Mar 28, 2021Updated 4 years ago
- A detailed list of potentially dangerous file extensions☆18Jun 18, 2025Updated 9 months ago
- An elevated STIX representation of the MITRE ATT&CK Groups knowledge base☆23May 23, 2022Updated 3 years ago
- Analytics for Accounting logs from Network devices☆18Mar 27, 2021Updated 4 years ago
- ☆10Apr 8, 2018Updated 7 years ago
- Reproducible and extensible BloodHound playbooks☆44Jan 20, 2020Updated 6 years ago
- Scan for giveaways of fake Mobile Base Stations to detect them.☆21May 19, 2016Updated 9 years ago
- Deep Learning for Domain Name System☆19Jan 14, 2022Updated 4 years ago
- SACTI - Securely aggregate CTI sightings and report them on MISP☆14Oct 24, 2022Updated 3 years ago
- DGA-generated domain detection using deep learning models☆24Nov 21, 2022Updated 3 years ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Jul 13, 2022Updated 3 years ago
- Small utility script to notify via Slack about Hashcat's progress during a password cracking session☆10Mar 10, 2019Updated 7 years ago
- Call your own DLL from VBA and execute code under process svchost.exe with WMI☆12Mar 6, 2020Updated 6 years ago
- Caldera plugin to deploy "humans" to emulate user behavior on systems☆31Apr 26, 2024Updated last year
- Extract the Procedures (TTP) from CTI reports☆17Dec 13, 2025Updated 3 months ago
- ☆20Feb 6, 2024Updated 2 years ago
- Malware.lu configuration extractor☆26Mar 27, 2014Updated 11 years ago
- A Canary which fires when uninstalled☆34Mar 16, 2021Updated 5 years ago
- ☆15Oct 29, 2024Updated last year
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆11Nov 24, 2023Updated 2 years ago
- ☆16May 13, 2021Updated 4 years ago
- A set of scripts to assist you in creating "a partner in communication"☆11Feb 18, 2025Updated last year
- A Python license checker☆16Mar 19, 2025Updated last year
- Harness the security superpowers of your cloud asset inventory☆11Sep 22, 2024Updated last year
- SightingDB is a database for Sightings☆22Jun 21, 2023Updated 2 years ago
- a simple powershell wrapper to automate checking a user's access around the network☆13Dec 5, 2023Updated 2 years ago
- A Docker container for Cowrie - SSH honeypot based on kippo☆11Jun 1, 2015Updated 10 years ago
- Invadium runs exploit playbooks against vulnerable target applications in an intuitive, reproducible, and well-defined manner.☆11Apr 27, 2023Updated 2 years ago
- ATT&CK Sync is a Center for Threat-Informed Defense project that aims to improve the ability for organizations to consume MITRE ATT&CK® v…☆24Dec 5, 2025Updated 3 months ago
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆17Jun 11, 2024Updated last year
- Portable native Erlang raw socket interface using pcap☆32Jan 18, 2024Updated 2 years ago
- Incident response teams usually working on the offline data, collecting the evidence, then analyze the data☆46Jan 2, 2022Updated 4 years ago
- Create machine images containing the Guacamole remote desktop gateway☆11Updated this week
- Notes for High Availability MISP in AWS☆19Nov 6, 2019Updated 6 years ago
- Keystroke injection tool collection for 2.4 GHz wireless input devices☆24Oct 20, 2023Updated 2 years ago
- Use dask to fetch data from Elasticsearch in parallel by sending the request to each shard separatelly.☆20Jan 2, 2021Updated 5 years ago