Aggregated ATT&CK technique reporting data. Presented at Splunk GovSummit December 2022
☆17Jul 18, 2025Updated 10 months ago
Alternatives and similar repositories for macro-level-attack-trending
Users that are interested in macro-level-attack-trending are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- R package for working with data stored within VERIS framework☆13Dec 22, 2015Updated 10 years ago
- The Admin Assistant allows Splunk admins to monitor data ingestion and onboarding, RBAC config, user onboarding, and more! Dashboard pane…☆10Feb 27, 2022Updated 4 years ago
- ☆12Feb 18, 2021Updated 5 years ago
- A Corpus of Data from Various Cybersecurity Blogs☆15Jun 28, 2022Updated 3 years ago
- The Splunk Web Framework Toolkit☆12May 3, 2022Updated 4 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- CISA Known Exploited Vulnerabilities Catalog Enrichment☆19Jun 24, 2024Updated last year
- A collection of Splunk dashboard templates.☆15Apr 18, 2019Updated 7 years ago
- Alternative password shadowing scheme☆10Feb 22, 2026Updated 2 months ago
- A python script that downloads your whole suno library with your Token and URL entered.☆38Oct 30, 2025Updated 6 months ago
- ☆23Jun 1, 2022Updated 3 years ago
- Splunk Searches and Dashboards for DNS Threat Hunting☆11Mar 5, 2018Updated 8 years ago
- 🌌 Real-time threat detection for smart contracts☆10May 16, 2023Updated 3 years ago
- scripts to configure the Splunk Universal Forwarder in a locked down state☆40Dec 13, 2018Updated 7 years ago
- Event Query Router☆12Aug 9, 2019Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆10Dec 19, 2024Updated last year
- SMET : Semantic Mapping of CVE to ATT&CK and its Application to Cybersecurity☆53Sep 14, 2024Updated last year
- This repo represents work the Phantom Community collaborates on to build apps and learn.☆13May 18, 2021Updated 5 years ago
- CLI Search for Security Operators of MITRE ATT&CK URLs☆17Jan 5, 2023Updated 3 years ago
- ETHICAL-HACKING☆13Dec 20, 2023Updated 2 years ago
- Import Mitre Att&ck into Neo4j database☆41Mar 5, 2026Updated 2 months ago
- Legacy password hashing framework for PHP applications needing to support or having previously supported PHP below 5.5☆15Nov 22, 2024Updated last year
- Exploit ConnectWise ScreenConnect (bypass authentication)☆13Feb 21, 2024Updated 2 years ago
- Generate representative samples from Pwned Passwords (HIBP)☆11Jan 6, 2022Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A repository of my own Sigma detection rules.☆165Nov 25, 2025Updated 5 months ago
- ATT&CK Sync is a Center for Threat-Informed Defense project that aims to improve the ability for organizations to consume MITRE ATT&CK® v…☆25Updated this week
- ☆34Oct 16, 2025Updated 7 months ago
- Test Suite for John the Ripper☆26Dec 28, 2025Updated 4 months ago
- ☆10Sep 12, 2024Updated last year
- Welcome to MitreMesh. Where MITRE's framework meets dynamic scenario generation, creating a comprehensive net of incident response tests …☆16Sep 5, 2023Updated 2 years ago
- Fast Windows post-exploitation wins after initial access.☆29Jan 28, 2026Updated 3 months ago
- Cloud threat detection visualization from excalidraw☆12Apr 25, 2022Updated 4 years ago
- Implementation of bcrypt password hashing scheme☆13Jan 11, 2021Updated 5 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Certificate Revocation List monitor☆50May 13, 2026Updated last week
- an excel-centric approach for the MITRE ATT&CK® Tactics and Techniques☆188May 5, 2022Updated 4 years ago
- Detection rules and threat hunting queries in Defender XDR and Azure Sentinel☆17Mar 13, 2026Updated 2 months ago
- A community-driven repository for threat hunting ideas, methodologies, and research that serves as a central gathering place for hunters …☆315May 13, 2026Updated last week
- Documentation for connecting Microsoft Sentinel and the ACSC CTIS platform☆10Jan 23, 2024Updated 2 years ago
- Threat Detection Rules (Snort/Sigma/Yara)☆14Jan 23, 2024Updated 2 years ago
- Yet another fseventsd parser for macOS forensics☆12Jul 20, 2024Updated last year