redcanaryco / vscode-attackLinks
Visual Studio Code extension for MITRE ATT&CK
☆54Updated 11 months ago
Alternatives and similar repositories for vscode-attack
Users that are interested in vscode-attack are comparing it to the libraries listed below
Sorting:
- A community event for security researchers to share their favorite notebooks☆107Updated last year
- Automatic detection engineering technical state compliance☆55Updated 11 months ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆63Updated 2 years ago
- Powershell Scripts to work on Crowdstrike Falcon that pull back raw data relevant to forensic investigation☆22Updated 5 months ago
- A few quick recipes for those that do not have much time during the day☆22Updated 7 months ago
- PSAttck is a light-weight framework for the MITRE ATT&CK Framework.☆38Updated 3 years ago
- pollen - A command-line tool for interacting with TheHive☆35Updated 6 years ago
- Threat intelligence and threat detection indicators (IOC, IOA)☆52Updated 4 years ago
- Windows Security Logging☆43Updated 2 years ago
- My Jupyter Notebooks☆36Updated 2 months ago
- Sharing Threat Hunting runbooks☆25Updated 5 years ago
- Machine Interrogation To Identify Gaps & Techniques for Execution☆32Updated 2 years ago
- ☆42Updated last year
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆70Updated 2 years ago
- A lab environment for learning about MSTICPy☆36Updated 2 years ago
- Attack Tool Timing and Reporting - Structured Attack Logging Format☆21Updated 2 years ago
- Useful access control entries (ACE) on system access control list (SACL) of securable objects to find potential adversarial activity☆91Updated 3 years ago
- ☆65Updated 3 months ago
- A tool to modify timestamps in a packet capture to a user selected date☆31Updated 3 years ago
- A collection of tips for using MISP.☆74Updated 5 months ago
- Collects a listing of MITRE ATT&CK Techniques, then discovers Splunk ESCU detections for each technique☆67Updated last year
- Accelerating the collection, processing, analysis and outputting of digital forensic artefacts.☆31Updated 4 months ago
- Recon Hunt Queries☆77Updated 4 years ago
- Python library for threat intelligence☆86Updated 4 months ago
- MITRE Shield website☆19Updated 3 years ago
- ☆77Updated 5 years ago
- DNS Dashboard for hunting and identifying beaconing☆16Updated 4 years ago
- Digital Forensics Artifacts Knowledge Base☆81Updated last year
- Repository with Sample threat hunting notebooks on Security Event Log Data Sources☆63Updated 2 years ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆72Updated 3 years ago