Aggregated ATT&CK technique reporting data. Presented at Splunk GovSummit December 2022
☆17Jul 18, 2025Updated 8 months ago
Alternatives and similar repositories for macro-level-attack-trending
Users that are interested in macro-level-attack-trending are comparing it to the libraries listed below
Sorting:
- R package for working with data stored within VERIS framework☆13Dec 22, 2015Updated 10 years ago
- The Admin Assistant allows Splunk admins to monitor data ingestion and onboarding, RBAC config, user onboarding, and more! Dashboard pane…☆10Feb 27, 2022Updated 4 years ago
- ☆12Feb 18, 2021Updated 5 years ago
- ☆21Nov 7, 2023Updated 2 years ago
- A Corpus of Data from Various Cybersecurity Blogs☆15Jun 28, 2022Updated 3 years ago
- The Splunk Web Framework Toolkit☆12May 3, 2022Updated 3 years ago
- CISA Known Exploited Vulnerabilities Catalog Enrichment☆19Jun 24, 2024Updated last year
- Tool for obtaining information about PPL processes☆16Feb 12, 2024Updated 2 years ago
- A collection of Splunk dashboard templates.☆15Apr 18, 2019Updated 6 years ago
- Alternative password shadowing scheme☆10Feb 22, 2026Updated 3 weeks ago
- ☆11Feb 9, 2023Updated 3 years ago
- ☆26Feb 5, 2024Updated 2 years ago
- A python script that downloads your whole suno library with your Token and URL entered.☆37Oct 30, 2025Updated 4 months ago
- Splunk Searches and Dashboards for DNS Threat Hunting☆10Mar 5, 2018Updated 8 years ago
- 🌌 Real-time threat detection for smart contracts☆10May 16, 2023Updated 2 years ago
- scripts to configure the Splunk Universal Forwarder in a locked down state☆40Dec 13, 2018Updated 7 years ago
- OCSP Responder monitor☆37Aug 5, 2024Updated last year
- Machines created to speed up analysis inside of Maltego☆16Mar 17, 2016Updated 10 years ago
- ☆77Feb 20, 2026Updated last month
- Event Query Router☆12Aug 9, 2019Updated 6 years ago
- ☆13Nov 24, 2021Updated 4 years ago
- ☆23Jun 1, 2022Updated 3 years ago
- ☆10Dec 19, 2024Updated last year
- This directory contains random scripts from threat hunting or malware research☆11Feb 15, 2018Updated 8 years ago
- SMET : Semantic Mapping of CVE to ATT&CK and its Application to Cybersecurity☆52Sep 14, 2024Updated last year
- ☆13Feb 17, 2022Updated 4 years ago
- CLI Search for Security Operators of MITRE ATT&CK URLs☆17Jan 5, 2023Updated 3 years ago
- ETHICAL-HACKING☆12Dec 20, 2023Updated 2 years ago
- This repo represents work the Phantom Community collaborates on to build apps and learn.☆13May 18, 2021Updated 4 years ago
- Import Mitre Att&ck into Neo4j database☆39Mar 5, 2026Updated 2 weeks ago
- Legacy password hashing framework for PHP applications needing to support or having previously supported PHP below 5.5☆16Nov 22, 2024Updated last year
- Splunk 7 Essentials - Third Edition, published by Packt☆17Jan 18, 2023Updated 3 years ago
- Exploit ConnectWise ScreenConnect (bypass authentication)☆13Feb 21, 2024Updated 2 years ago
- Generate representative samples from Pwned Passwords (HIBP)☆11Jan 6, 2022Updated 4 years ago
- Perform file-based malware scan on your on-prem servers with AWS☆14Oct 31, 2023Updated 2 years ago
- Queries for Carbon Black Response☆11Feb 11, 2020Updated 6 years ago
- A repository with data about APTs☆13Nov 24, 2022Updated 3 years ago
- A repository of my own Sigma detection rules.☆163Nov 25, 2025Updated 3 months ago
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆409Updated this week