motherhack3r / mitre
MITRE package gives you an approach to cybersecurity data sets.
☆19Updated last year
Related projects ⓘ
Alternatives and complementary repositories for mitre
- Digital Forensics date and time☆23Updated last month
- ☆45Updated last year
- A Simple Log4j Indicator of Compromise Linux Detector☆14Updated 2 years ago
- ☆11Updated 3 years ago
- A dataset of phishing kits in the wild☆15Updated 5 months ago
- A CALDERA plugin for ATT&CK Evaluations Round 1☆33Updated last year
- Developper-proof prevention of SQL injection (java library)☆11Updated 3 years ago
- Adversary Emulation Planner☆38Updated 4 months ago
- ☆16Updated 8 months ago
- Collection of IoCs available and related to attacks on ESXi infrastructures that occurred as of Friday February 3, 2023.☆12Updated last year
- Can you pay the ransom in your country?☆14Updated 11 months ago
- Copy of the libewf source code that is configured for a 64-bit MS Visual Studio build.☆15Updated 4 years ago
- A mini project to exfiltrate data via QR codes☆19Updated 7 months ago
- MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.☆60Updated 7 months ago
- Log4Shell IOCs from CERT Orange Cyberdefense Threat Intelligence Datalake☆18Updated last year
- ☆12Updated 3 years ago
- Open YARA scan- and search engine☆17Updated last week
- Scripts and lists to help generate YARA friendly string mutations☆19Updated last year
- A port scanner written in PowerShell☆13Updated 3 years ago
- Cont3xt intends to centralize and simplify a structured approach to gathering contextual intelligence in support of technical investigati…☆36Updated 8 months ago
- CyCAT.org API back-end server including crawlers☆30Updated last year
- Automatically generated Sysmon parser for Azure Sentinel☆15Updated this week
- ☆12Updated 2 years ago
- MISP sighting server is a fast sighting server to store and look-up sightings on attributes (network indicators, file hashes, system indi…☆15Updated 10 months ago
- ☆10Updated last year
- ☆12Updated 3 years ago
- Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.☆15Updated 3 years ago
- An extension of the sigma standard to include security metrics.☆15Updated last year
- Log aggregation, analysis, alerting and correlation for Windows, Syslog and text based logs.☆25Updated 8 years ago
- Network based steganography based control channels and chat.☆8Updated 8 years ago