Generate portable TTP intelligence from a web-based report
☆31Oct 24, 2022Updated 3 years ago
Alternatives and similar repositories for webpage2attack
Users that are interested in webpage2attack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Merge of two major cyber adversary datasets, MITRE ATT&CK and ETDA/ThaiCERT Threat Actor Cards, enabling victim/motivation-adversary-tech…☆54Jul 31, 2022Updated 3 years ago
- Intelligence around common attacker behaviors (MITRE ATT&CK TTPs), in the form of ATT&CK Navigator "layer" json files.☆36Aug 12, 2022Updated 3 years ago
- Pointing cybersecurity teams to thousands of detection rules and offensive security tests aligned with common attacker techniques☆142Feb 25, 2024Updated 2 years ago
- Cumulonimbus-UAL_Extractor is a PowerShell based tool created by the Tesorion CERT team to help gather the Unified Audit Logging out of a…☆21Oct 25, 2023Updated 2 years ago
- Shiro key check,golang Version☆58Aug 27, 2022Updated 3 years ago
- A repository of my own Sigma detection rules.☆164Nov 25, 2025Updated 3 months ago
- ☆12Jan 5, 2021Updated 5 years ago
- ☆33Feb 26, 2022Updated 4 years ago
- Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. The research…☆57Mar 2, 2026Updated 3 weeks ago
- This repo hosts links to blogs, documentation and assets referenced by the Security Guide Blog.☆12Feb 11, 2026Updated last month
- List with File Extensions used by Ransomware☆37Updated this week
- multi-threaded script uses VirusTotal and AbuseIPDB APIs and generate an excel with all needed data☆10Mar 14, 2023Updated 3 years ago
- The Secure Coding Framework☆22Jun 19, 2020Updated 5 years ago
- KEV EPSS Data☆31Updated this week
- ☆17Jan 22, 2026Updated 2 months ago
- A tool to quickly identify relevant, publicly-available open source intelligence ("OSINT") tools and resources, saving valuable time duri…☆794Jul 30, 2024Updated last year
- ☆10Apr 2, 2022Updated 3 years ago
- Automatically perform exploratory data analysis, and generate a report in Word '.docx' format.☆10Feb 11, 2026Updated last month
- A set of tools for collecting forensic information☆27Apr 4, 2020Updated 5 years ago
- This repository brings together tool builders, bloggers, speakers, book authors, and other interesting Mastodon accounts☆138Sep 7, 2023Updated 2 years ago
- Wi-Fi Hacking Workshop