sbousseaden / macOS-ATTACK-DATASETLinks
JSON DataSet for macOS mapped to MITRE ATT&CK Tactics.
☆156Updated 3 years ago
Alternatives and similar repositories for macOS-ATTACK-DATASET
Users that are interested in macOS-ATTACK-DATASET are comparing it to the libraries listed below
Sorting:
- A Cobalt Strike Scanner that retrieves detected Team Server beacons into a JSON object☆167Updated 2 years ago
- Mindmaps for threat hunting - work in progress.☆150Updated 3 years ago
- Build a attack range in your local machine☆131Updated 2 years ago
- attack2jira automates the process of standing up a Jira environment that can be used to track and measure ATT&CK coverage☆113Updated 2 years ago
- Detection Ideas & Rules repository.☆179Updated 3 years ago
- IOC from articles, tweets for archives☆313Updated last year
- ☆130Updated last year
- Automatically create YARA rules from malicious documents.☆211Updated 3 years ago
- Blueteam operational triage registry hunting/forensic tool.☆148Updated 2 years ago
- Misc Threat Hunting Resources☆373Updated 2 years ago
- Picus Labs☆44Updated 4 years ago
- Active C2 IoCs☆99Updated 2 years ago
- Searches For Threat Hunting and Security Analytics☆241Updated 3 months ago
- Cloud Templates and scripts to deploy mordor environments☆129Updated 4 years ago
- Sysmon EDR POC Build within Powershell to prove ability.☆225Updated 4 years ago
- Purple Teaming Attack & Hunt Lab - Terraform☆159Updated 3 years ago
- ARTi-C2 is a post-exploitation framework used to execute Atomic Red Team test cases with rapid payload deployment and execution capabili…☆176Updated last week
- S2AN - Mapper of Sigma/Suricata Rules/Signatures ➡️ MITRE ATT&CK Navigator☆87Updated 2 years ago
- A list of JARM hashes for different ssl implementations used by some C2/red team tools.☆141Updated 2 years ago
- Personal compilation of APT malware from whitepaper releases, documents and own research☆260Updated 6 years ago
- My conference presentations☆66Updated last year
- Public Repo for Atomic Test Harness☆274Updated 2 months ago
- evtx-hunter helps to quickly spot interesting security-related activity in Windows Event Viewer (EVTX) files.☆154Updated 3 years ago
- A repo containing tools developed by Carbon Black's Threat Research Team: Threat Analysis Unit☆235Updated 3 years ago
- This script is made to collect the most valiable artifacts for foreniscs or incident reponse investigation rather than imaging the whole …☆202Updated 4 years ago
- Code and yara rules to detect and analyze Cobalt Strike☆269Updated 4 years ago
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆203Updated 2 years ago
- Sigma rules from Joe Security☆216Updated 7 months ago
- #ThreatHunting #DFIR #Malware #Detection Mind Maps☆297Updated 3 years ago
- Detecting ATT&CK techniques & tactics for Linux☆258Updated 4 years ago