A threat sighting collects the behavior of a real threats and the observables used during its engagement.
☆12Mar 29, 2022Updated 4 years ago
Alternatives and similar repositories for ac3-threat-sightings
Users that are interested in ac3-threat-sightings are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- TIBER-Cases is a project created to give cases of The Hive platform for Threat Intelligence Analysts mainly. All the cases are mapped to …☆27Jul 13, 2022Updated 3 years ago
- Intelligence around common attacker behaviors (MITRE ATT&CK TTPs), in the form of ATT&CK Navigator "layer" json files.☆36Aug 12, 2022Updated 3 years ago
- SACTI - Securely aggregate CTI sightings and report them on MISP☆14Oct 24, 2022Updated 3 years ago
- Intel Retrieval Augmented Generation (RAG) Utilities☆91Jan 29, 2024Updated 2 years ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- My Jupyter Notebooks☆36Mar 14, 2025Updated last year
- Registry to JSON. This Project is for learning purposes and is not maintained.☆12Dec 28, 2021Updated 4 years ago
- STIX 2.1 Visualizer, Attack and Activity Thread Graph for Threat Modeling☆33Dec 9, 2024Updated last year
- User Feedback Space of #MitreAssistant☆38May 19, 2023Updated 2 years ago
- Scripts to automate standing up C2 infra with firewall settings inside of DigitalOcean.☆18Feb 5, 2021Updated 5 years ago
- Automated solution to set up Termux environment quickly and effortlessly.☆10Jun 10, 2023Updated 2 years ago
- Learn how to get more out of publicly available threat reports to help improve the security posture of your organization! TLP: White Thre…☆15Jun 5, 2023Updated 2 years ago
- ETW-Almulahaza is a consumer python-based tool that help you monitor ETW events of the operating system☆13Jun 24, 2022Updated 3 years ago
- Cyber threat intelligence crates for Rust☆16Jan 22, 2024Updated 2 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Tool to download, install, and run macOS capable command & control servers (i.e., C2s with macOS payloads/clients) as docker containers f…☆19Dec 29, 2020Updated 5 years ago
- ☆18Jun 20, 2023Updated 2 years ago
- Threat Mapping Catalogue☆18Aug 10, 2021Updated 4 years ago
- Living Under the Land on Linux ~ Bsides Belfast/Vienna 2025☆38Nov 22, 2025Updated 4 months ago
- Yet another VirusTotal API wrapper for Ruby☆14Oct 17, 2023Updated 2 years ago
- vt-use-cases☆20Dec 1, 2023Updated 2 years ago
- This is a frontend for the STIX™ (2.0) language.☆17Dec 20, 2018Updated 7 years ago
- Augmentation to Machine Readable CTI☆37Sep 9, 2025Updated 6 months ago
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆35Oct 21, 2025Updated 5 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ☆27Feb 6, 2022Updated 4 years ago
- The repository accompanying the Buer Emulation workshop☆24Aug 18, 2021Updated 4 years ago
- Actionable data for Security Operations☆19Aug 26, 2021Updated 4 years ago
- ☆22Feb 25, 2026Updated last month
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆43Jan 20, 2026Updated 2 months ago
- Private Search Set (PSS) is an extension to standard Bloom filter or a standalone hash file to describe and share private set.☆16Jan 10, 2025Updated last year
- Automating Cyber Threat Intelligence Reporting with Natural Language Generation☆15Jan 24, 2024Updated 2 years ago
- 🐢 Multiple Reverse Shell Handler | Stage 0/1 C2 Framework. Enhances Shell functionality and generates obfuscated powershell payload. Sup…☆17Updated this week
- ☆28Dec 26, 2025Updated 3 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Automate the regular transfer of AIS data into a MISP Server☆10Jun 5, 2024Updated last year
- A collection of Terraform and Ansible scripts that automatically (and quickly) deploys a small Velociraptor R&D lab.☆22Apr 16, 2021Updated 4 years ago
- Prompt Injection Attacks against GPT-4, Gemini, Azure, Azure with Jailbreak☆29Oct 8, 2024Updated last year
- Get the process name or process id on windows☆20Jun 1, 2025Updated 9 months ago
- ☆12Sep 8, 2025Updated 6 months ago
- Builds graph of npm dependencies from npm registry☆31Nov 25, 2025Updated 4 months ago
- Share your Yara rules with VirusTotal☆28Aug 12, 2024Updated last year