A simple Docker container that serves the MITRE ATT&CK Navigator web app
☆27Apr 23, 2023Updated 2 years ago
Alternatives and similar repositories for attack-navigator-docker
Users that are interested in attack-navigator-docker are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆13Oct 7, 2019Updated 6 years ago
- This package allows for creating alerts in The Hive from emails retrieved from a Microsoft Exchange mailbox.☆12Jul 13, 2017Updated 8 years ago
- Firepit - STIX Columnar Storage☆18Jun 5, 2024Updated last year
- A collection of Sigma rules organized by MITRE ATT&CK technique☆18Apr 1, 2026Updated last week
- Fast, simple library in Go to fetch CVEs from the National Vulnerability Database feeds☆29Jul 4, 2023Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Integration between MISP platform and McAfee MVISION EDR☆14Mar 14, 2022Updated 4 years ago
- Public rules and samples for various automations through LimaCharlie.io☆14Dec 16, 2021Updated 4 years ago
- Cyber Analytics Platform and Examination System (CAPES) Project Page☆14Feb 1, 2022Updated 4 years ago
- Creates an ATT&CK Navigator map of an Adversary Emulation Plan☆17Sep 4, 2021Updated 4 years ago
- \ PowerAvails Powershell /☆10Jun 30, 2018Updated 7 years ago
- RenameLocalVars is an IDA plugin that renames local variables to something easier to read.☆15Jul 9, 2023Updated 2 years ago
- Toolset to analyse TLS datasets☆12Aug 7, 2019Updated 6 years ago
- ☆14Apr 24, 2024Updated last year
- Python script to automatically create sigma rules from The hive observables☆25Mar 17, 2019Updated 7 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Powershell sandboxing utility☆19Mar 2, 2026Updated last month
- Translate STIX 2 Patterning Queries☆31Oct 4, 2018Updated 7 years ago
- Another MISP module for Python☆18Feb 17, 2020Updated 6 years ago
- ☆18Jun 8, 2018Updated 7 years ago
- A sub-domain reconnaissance written in golang☆12Jan 11, 2018Updated 8 years ago
- llama is lightgrep's amazing media analyzer☆16Mar 24, 2026Updated 2 weeks ago
- Recipes for GCHQ's CyberChef Web App☆40Nov 15, 2018Updated 7 years ago
- A Windows registry file parser written in Rust☆41Oct 30, 2025Updated 5 months ago
- A completely unsupported set of scripts used in SANS FOR572, Advanced Network Forensics and Analysis☆28Aug 6, 2025Updated 8 months ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Container Blackbox Security Auditing Tool: enumerates security configuration from within the target container☆106Nov 30, 2018Updated 7 years ago
- Security Onion Splunk App☆10May 18, 2015Updated 10 years ago
- References for FIRST CTI 2019 Symposium presentation☆23Mar 19, 2019Updated 7 years ago
- This Django application is port the AdminLTE Template for easy integration into Django Framework☆11Jul 3, 2020Updated 5 years ago
- Docker Container to deploy Mitre Caldera Automated Adversary Emulation System☆26Sep 26, 2020Updated 5 years ago
- A Python library to help with some common threat hunting data analysis operations☆142Apr 23, 2023Updated 2 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆14Jul 18, 2018Updated 7 years ago
- Powershell Functions to interact with TheHive-Project☆11Jun 27, 2019Updated 6 years ago
- ☆12Apr 26, 2018Updated 7 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Maltego entity pack encompassing the entire STIX 1.2 data model and a targeted subset of the CybOX 2.1 data model☆11Mar 24, 2016Updated 10 years ago
- Demo code and other hand-out materials for our Python for Decision Makers and Business Leaders course☆24Apr 19, 2021Updated 4 years ago
- Random scripts for log mining, intel gathering, network querying, and other incident response-ish activities☆16Sep 13, 2022Updated 3 years ago
- ☆53Oct 20, 2020Updated 5 years ago
- ☆56Mar 6, 2026Updated last month
- Splunk csv to KVStore ES Threat Intel☆11Jul 11, 2016Updated 9 years ago
- An SMB library in Go☆13Oct 27, 2022Updated 3 years ago