A simple Docker container that serves the MITRE ATT&CK Navigator web app
☆27Apr 23, 2023Updated 2 years ago
Alternatives and similar repositories for attack-navigator-docker
Users that are interested in attack-navigator-docker are comparing it to the libraries listed below
Sorting:
- ☆13Oct 7, 2019Updated 6 years ago
- Cuckoo Sandbox is an automated dynamic malware analysis system☆10Sep 11, 2020Updated 5 years ago
- Public rules and samples for various automations through LimaCharlie.io☆14Dec 16, 2021Updated 4 years ago
- Toolset to analyse TLS datasets☆12Aug 7, 2019Updated 6 years ago
- This package allows for creating alerts in The Hive from emails retrieved from a Microsoft Exchange mailbox.☆12Jul 13, 2017Updated 8 years ago
- ☆14Apr 24, 2024Updated last year
- Cyber Analytics Platform and Examination System (CAPES) Project Page☆14Feb 1, 2022Updated 4 years ago
- Creates an ATT&CK Navigator map of an Adversary Emulation Plan☆17Sep 4, 2021Updated 4 years ago
- Integration between MISP platform and McAfee MVISION EDR☆14Mar 14, 2022Updated 3 years ago
- A collection of Sigma rules organized by MITRE ATT&CK technique☆18Jul 26, 2021Updated 4 years ago
- Docker container bundling tools for manual AWS security reviews☆12Sep 12, 2018Updated 7 years ago
- ☆18Jun 8, 2018Updated 7 years ago
- TightVNC Vulnerability.☆16Jan 26, 2022Updated 4 years ago
- Python script to parse Keytab files for macOS or *nix (typically /etc/krb5.keytab)☆41Jun 19, 2019Updated 6 years ago
- ☆20Jul 19, 2021Updated 4 years ago
- Bash script to take the powerkatz.dll files, encode them using base64 and then replace the old binaries with the new in the Invoke-Mimika…☆16Oct 8, 2016Updated 9 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆14Jul 18, 2018Updated 7 years ago
- Firepit - STIX Columnar Storage☆18Jun 5, 2024Updated last year
- Coding examples for the OpenDNS Investigate API☆24Nov 2, 2019Updated 6 years ago
- Container Blackbox Security Auditing Tool: enumerates security configuration from within the target container☆106Nov 30, 2018Updated 7 years ago
- ☆53Oct 20, 2020Updated 5 years ago
- Synopsis is a tool to aid analysts reviewing browser history files by providing a high-level “synopsis” of key information.☆22Oct 31, 2018Updated 7 years ago
- Demo code and other hand-out materials for our Python for Decision Makers and Business Leaders course☆24Apr 19, 2021Updated 4 years ago
- ☆25Jul 5, 2018Updated 7 years ago
- ☆19Jul 24, 2021Updated 4 years ago
- Script to check an installed packages list against the ubuntu-cve-tracker☆25Sep 20, 2017Updated 8 years ago
- Docker Container to deploy Mitre Caldera Automated Adversary Emulation System☆26Sep 26, 2020Updated 5 years ago
- Fast, simple library in Go to fetch CVEs from the National Vulnerability Database feeds☆29Jul 4, 2023Updated 2 years ago
- Python script to automatically create sigma rules from The hive observables☆25Mar 17, 2019Updated 6 years ago
- ☆54Sep 6, 2020Updated 5 years ago
- ☆11Feb 9, 2023Updated 3 years ago
- "Fuzzy matching" for SQLite databases☆30Jun 30, 2020Updated 5 years ago
- References for FIRST CTI 2019 Symposium presentation☆23Mar 19, 2019Updated 6 years ago
- AMSI detection PoC☆31Apr 14, 2020Updated 5 years ago
- Old home of LimaCharlie, open source EDR☆32Sep 4, 2023Updated 2 years ago
- Quickly create workflows, business and process automation pipelines. Supports API, UI and Cron based workflows.☆30Feb 7, 2024Updated 2 years ago
- ☆30Mar 2, 2023Updated 2 years ago
- ARDvark parses the Apple Remote Desktop (ARD) files to pull out application usage, user activity, and filesystem listings.☆36Jun 1, 2023Updated 2 years ago
- The repository contains three lists. You only need to use one. Global proxy list or proxy list from RU, BU, KZ or proxy list by RU region☆10Updated this week