Aggregated ATT&CK technique reporting data. Presented at Splunk GovSummit December 2022
โ17Jul 18, 2025Updated 7 months ago
Alternatives and similar repositories for macro-level-attack-trending
Users that are interested in macro-level-attack-trending are comparing it to the libraries listed below
Sorting:
- OCSP Responder monitorโ37Aug 5, 2024Updated last year
- ๐ Real-time threat detection for smart contractsโ10May 16, 2023Updated 2 years ago
- ETHICAL-HACKINGโ12Dec 20, 2023Updated 2 years ago
- scripts to configure the Splunk Universal Forwarder in a locked down stateโ40Dec 13, 2018Updated 7 years ago
- Certificate Revocation List monitorโ48Aug 6, 2024Updated last year
- Event Query Routerโ12Aug 9, 2019Updated 6 years ago
- Contains research.splunk.com site codeโ11Apr 10, 2024Updated last year
- jhipster multi tenancy with schema selection (share db connections) on mariadbโ12Oct 25, 2017Updated 8 years ago
- BSD-licensed open source Java library for consuming NVDB REST APIโ14Sep 5, 2025Updated 5 months ago
- Alternative password shadowing schemeโ10Feb 22, 2026Updated last week
- โ11Dec 11, 2022Updated 3 years ago
- Perform file-based malware scan on your on-prem servers with AWSโ14Oct 31, 2023Updated 2 years ago
- Command line tools for Qualcomm EFS file systemโ11Jan 16, 2020Updated 6 years ago
- โ13Sep 22, 2017Updated 8 years ago
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CKยฎ knowledge base. This repository conโฆโ408Updated this week
- Splunk Searches and Dashboards for DNS Threat Huntingโ10Mar 5, 2018Updated 7 years ago
- Detection rules and threat hunting queries in Defender XDR and Azure Sentinelโ16Feb 11, 2026Updated 2 weeks ago
- Lightweight SMTP connection pool with clustering support, wait/release mechanism, connection lifecycle management, eager/lazy loading pooโฆโ12Sep 15, 2024Updated last year
- โ13Sep 15, 2024Updated last year
- โ12Oct 25, 2023Updated 2 years ago
- Small and highly portable detection tests based on MITRE's ATT&CK.โ12Jun 24, 2021Updated 4 years ago
- Legacy password hashing framework for PHP applications needing to support or having previously supported PHP below 5.5โ16Nov 22, 2024Updated last year
- This directory contains random scripts from threat hunting or malware researchโ11Feb 15, 2018Updated 8 years ago
- Experimental JHipster application with Angular Universal. Enables SSR on Jhipster Angular projects.โ13Oct 10, 2023Updated 2 years ago
- Queries for Carbon Black Responseโ11Feb 11, 2020Updated 6 years ago
- โ13Nov 24, 2021Updated 4 years ago
- Volumetric Developmentโ11Mar 19, 2024Updated last year
- OLD Produces the UI bundle used by the Couchbase documentation site.โ11Aug 4, 2020Updated 5 years ago
- Exploit ConnectWise ScreenConnect (bypass authentication)โ13Feb 21, 2024Updated 2 years ago
- โ10Sep 12, 2024Updated last year
- โ10Dec 19, 2024Updated last year
- code for Graph Intelligence Enhanced Bi-Channel Insider Threat Detection paperโ13Aug 30, 2022Updated 3 years ago
- SMET : Semantic Mapping of CVE to ATT&CK and its Application to Cybersecurityโ52Sep 14, 2024Updated last year
- Tool for obtaining information about PPL processesโ16Feb 12, 2024Updated 2 years ago
- Cyber security issues are around the globe where data security is the major concern, one or the another company vulnerable to data leakagโฆโ11Dec 4, 2022Updated 3 years ago
- State of vulnerabilties reportโ11Feb 20, 2020Updated 6 years ago
- linux driver workaround for Huion Inspiroy G10Tโ11Jan 7, 2019Updated 7 years ago
- โ11May 17, 2018Updated 7 years ago
- challenge software engineer aws-spโ12Mar 28, 2020Updated 5 years ago