Import Mitre Att&ck into Neo4j database
☆39Dec 8, 2022Updated 3 years ago
Alternatives and similar repositories for attack2neo
Users that are interested in attack2neo are comparing it to the libraries listed below
Sorting:
- Threat Mapping Catalogue☆18Aug 10, 2021Updated 4 years ago
- PowerShell scripts for fast Windows Event Collector configuration with Palantir toolset☆22May 21, 2022Updated 3 years ago
- Open Source Tool - Cybersecurity Graph Database in Neo4j☆69Sep 8, 2023Updated 2 years ago
- Graph Representation of MITRE ATT&CK's CTI data☆51Nov 14, 2019Updated 6 years ago
- Threat hunting with Sysmon and ArangoDB Graphs☆12Apr 16, 2020Updated 5 years ago
- Bellingcat Hackathon - Digital Investigation Tool 2022☆12Sep 25, 2022Updated 3 years ago
- Dynamic Callbacks can be used for re-establishing communication with C2 infrastructure and for achieving persistence by using different m…☆15Oct 17, 2018Updated 7 years ago
- Threat Detection System using Hybrid (Machine Learning + Lexical Analysis) learning Approach.☆11May 30, 2017Updated 8 years ago
- 威胁检测规则集☆15Jul 5, 2019Updated 6 years ago
- Machine learning on knowledge graphs for context-aware security monitoring (data and model)☆18Mar 11, 2022Updated 3 years ago
- ETM enables the creation of detailed attack graphs and figures while calculating the risk associated with your attack narratives. ETM was…☆26Mar 3, 2023Updated 2 years ago
- Minimalist Custom .NET Core Garbage Collector☆23Jun 15, 2020Updated 5 years ago
- Simple .NET loader for loading and executing Powershell payloads☆17Nov 5, 2021Updated 4 years ago
- Python script which takes internal asset inventory at scale using zmap. Outputs to CSV.☆21Mar 9, 2022Updated 3 years ago
- Méthode de Sensibilisation à la Sécurité Informatique pour un public Néophyte☆17Jun 17, 2015Updated 10 years ago
- ☆39Jul 29, 2021Updated 4 years ago
- Mitre Att&ck Technique Emulation☆82Mar 6, 2019Updated 6 years ago
- ProcDot Malware Sandbox☆26Jul 28, 2025Updated 7 months ago
- Automatic detection engineering technical state compliance☆55Jul 7, 2024Updated last year
- Indicators of Compromise (IOCs) accompanying HP Threat Research blog posts and reports.☆29Apr 10, 2024Updated last year
- ☆35Jun 22, 2021Updated 4 years ago
- ☆11Feb 9, 2023Updated 3 years ago
- OSSEM Detection Model☆183Oct 11, 2022Updated 3 years ago
- an excel-centric approach for the MITRE ATT&CK® Tactics and Techniques☆187May 5, 2022Updated 3 years ago
- made a chatbot based on openai gpt model that can search google. made with langchain and gradio ui☆26Apr 14, 2023Updated 2 years ago
- Atlassian Confluence CVE-2021-26084 one-liner mass checker☆30Sep 7, 2021Updated 4 years ago
- This repository contains OpenIOC rules to aid in hunting for indicators of compromise and TTPs focused on Advanced Persistent Threat grou…☆26Oct 3, 2023Updated 2 years ago
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆60Mar 12, 2022Updated 3 years ago
- ssdeep cluster analysis for malware files☆31Jun 5, 2020Updated 5 years ago
- Generate JSON force-directed/ node graph data from MITRE's ATTACK framework and visualize it interactively☆38Apr 19, 2025Updated 10 months ago
- Timestomping module: overwrite file create/modify times in .NET (no pinvoke)☆27Dec 13, 2021Updated 4 years ago
- cobalt strike tools☆31Nov 4, 2021Updated 4 years ago
- Security Content for the PEAK Threat Hunting Framework☆44Feb 15, 2024Updated 2 years ago
- Volatility MindMap & Cheat Sheet☆28Feb 6, 2022Updated 4 years ago
- ☆10May 25, 2021Updated 4 years ago
- Information Security Knowledge Graph about NVD CAPEC CWE CPE ..☆66May 12, 2020Updated 5 years ago
- A logging ASKPASS binary☆29May 29, 2020Updated 5 years ago
- A repository where I share my injection implemintations☆29Jul 26, 2020Updated 5 years ago
- An example of how to spawn a process with a spoofed parent PID (Visual C++)☆29Mar 3, 2019Updated 6 years ago