This repository contains generated contextual data utilized by pyattck.
☆19Mar 3, 2025Updated last year
Alternatives and similar repositories for pyattck-data
Users that are interested in pyattck-data are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Actionable analytics designed to combat threats based on MITRE's ATT&CK.☆23Aug 21, 2019Updated 6 years ago
- Pythonic way to work with the warning lists defined there: https://github.com/MISP/misp-warninglists☆36Jan 8, 2026Updated 3 months ago
- Python module to use the MISP Taxonomies☆31Apr 8, 2026Updated last week
- Creating an ATT&CK Navigator layer with the detection coverage of the signals available within Tanium Threat Response.☆12Jun 2, 2021Updated 4 years ago
- Standalone Go implementation of Metasploit's "db_nmap" and "db_import" commands.☆19Nov 6, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆17Mar 28, 2023Updated 3 years ago
- A Python package to interact with the Mitre ATT&CK Framework☆478Oct 10, 2023Updated 2 years ago
- PowerShell Memory Pulling script☆19Mar 24, 2015Updated 11 years ago
- A Sigma based detection pipeline☆12Dec 15, 2023Updated 2 years ago
- Machine Learning Security Principles, published by Packt☆23Mar 2, 2026Updated last month
- MISP-STIX-Converter - Python library to handle the conversion between MISP and STIX formats☆57Apr 9, 2026Updated last week
- The GitHub repo for the GRC Engineering For AWS Book. Everything You Need to Become a GRC Engineer in the Cloud GRC engineering bridges t…☆36Jul 25, 2025Updated 8 months ago
- Python CLI covering the FileScan.IO API - enabling automatic interaction with www.filescan.io or private instances☆18Jul 15, 2025Updated 9 months ago
- A repository of curated lists with elements such as IoCs to use for threat hunting & detection queries.☆34Jul 23, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Remotely collect linux live forensics artifacts.☆14Jul 8, 2022Updated 3 years ago
- Django Tasks Manager - Simple Celery Integration | AppSeed☆14Nov 1, 2022Updated 3 years ago
- The backend server handling API requests and task management☆60Updated this week
- STIX 2.1 Visualizer, Attack and Activity Thread Graph for Threat Modeling☆33Dec 9, 2024Updated last year
- A Riak (nosql) backend for Django☆37Dec 22, 2011Updated 14 years ago
- ☆11Dec 9, 2025Updated 4 months ago
- 🐻❄️ 🏹 Threat hunting with Polars and flaws.cloud AWS CloudTrail datasets.☆14May 22, 2024Updated last year
- Documentation and tools to curate Sigma rules for Windows event logs into easier to parse rules.☆15Oct 22, 2025Updated 5 months ago
- ☆58Oct 23, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Python API for minFraud☆30Updated this week
- External telegram feeder for AIL framework☆18Jan 21, 2026Updated 2 months ago
- EuroSciPy 2019 Numba Tutorial☆12Sep 2, 2019Updated 6 years ago
- sample code to MicrosoftDefenderATP API☆27Apr 5, 2021Updated 5 years ago
- ☆13Dec 16, 2024Updated last year
- Windows Research Kernel☆14Apr 1, 2016Updated 10 years ago
- Efficient wildcard matching against strings☆15May 21, 2024Updated last year
- netbeacon - monitoring your network capture, NIDS or network analysis process☆20Apr 5, 2026Updated last week
- 10 Machine Learning Blueprints You Should Know for Cybersecurity, published by Packt☆30Mar 2, 2026Updated last month
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- 个人渗透测试常用加解密算法实现。☆12May 18, 2023Updated 2 years ago
- Graphs in Cybersecurity - Bloodhound☆20Oct 8, 2024Updated last year
- Testing Azure ARM / Image Builder and DSC to establish STIG'd resource☆39Apr 13, 2024Updated 2 years ago
- ☆21Nov 19, 2025Updated 4 months ago
- A web scraper to create MISP events and reports☆17Jun 30, 2025Updated 9 months ago
- MSTIC Notebook Components☆35Sep 4, 2025Updated 7 months ago
- ☆15Mar 27, 2019Updated 7 years ago