Tools related to work with Attack Flow (https://github.com/center-for-threat-informed-defense/attack-flow)
☆44Jun 6, 2022Updated 3 years ago
Alternatives and similar repositories for flow
Users that are interested in flow are comparing it to the libraries listed below
Sorting:
- Attack Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by devel…☆719Nov 14, 2025Updated 3 months ago
- ☆16May 13, 2021Updated 4 years ago
- Prototype system to monitor BGP routes and alert when anomalies are identified☆15Dec 7, 2018Updated 7 years ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆74Jan 26, 2022Updated 4 years ago
- 🚨ATTENTION🚨 The VERIS mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here …☆72Apr 3, 2024Updated last year
- A Platform for Testing Secure Coding/Config☆19Nov 13, 2018Updated 7 years ago
- A generic security incident response playbook investigating and responding to potential compromises of Okta's internal systems, in the co…☆20Mar 24, 2022Updated 3 years ago
- Making transparency normal!☆24Dec 18, 2023Updated 2 years ago
- DomainPasswordSpray is a tool written in PowerShell to perform a password spray attack against users of a domain. It will automatically g…☆98Oct 13, 2022Updated 3 years ago
- Import AbuseCH IOC Feeds into MISP☆12Feb 17, 2021Updated 5 years ago
- Test Azure environment for MFA misconfigurations☆12Jan 13, 2023Updated 3 years ago
- A utility to force query DNS over DoH off of CloudFlare API when DNS block is in place☆10Aug 26, 2018Updated 7 years ago
- Various components we use in labs☆10Oct 30, 2020Updated 5 years ago
- A bunch of library code that can easily be included in new/prototype projects with few (usually zero) dependencies, even on themselves.☆12Jul 26, 2020Updated 5 years ago
- ☆12Feb 8, 2023Updated 3 years ago
- A password list optimized for use on Android devices.☆11Jul 2, 2022Updated 3 years ago
- A rust utility for instrumenting binaries, used in Holiday Hack Challenge 2021☆27Mar 9, 2022Updated 3 years ago
- Windows registry samples☆24Nov 18, 2018Updated 7 years ago
- Event metadata collected across all manifest-based ETW providers on Window 10 1903☆32Nov 25, 2019Updated 6 years ago
- Supporting PoCs and scripts for my talk "OverLAPS: Overriding LAPS Logic"☆22Oct 12, 2025Updated 4 months ago
- Mount VSCs with ease!☆18Jan 22, 2025Updated last year
- ☆11Jun 12, 2023Updated 2 years ago
- Duo MFA auditing tool to test users' likelihood of approving unexpected push notifications☆13Apr 20, 2018Updated 7 years ago
- Small Python-based web application honeypot with built-in analysis tools.☆12Sep 15, 2019Updated 6 years ago
- IBM System i (formerly AS400, iSeries, i5, etc.)☆12Feb 10, 2013Updated 13 years ago
- Rust-based password mutator for brute force attacks☆13Mar 21, 2025Updated 11 months ago
- PurpleSpray is an adversary simulation tool that executes password spray behavior under different scenarios and conditions with the purpo…☆51Aug 15, 2019Updated 6 years ago
- PowerAvails is a unit of collection of Powershell modules that help you get done many things☆118May 31, 2019Updated 6 years ago
- Various capabilities for static malware analysis.☆80Sep 4, 2024Updated last year
- A JXA script for enumerating running processes, printed out in a json, parent-child tree.☆14Jan 28, 2022Updated 4 years ago
- F5 Service Password Decryption☆29Jul 31, 2025Updated 7 months ago
- This is a repository for reporting any issues in any of my software☆13May 15, 2018Updated 7 years ago
- Microsoft 365 Defender Hunting via PowerShell.☆14Feb 8, 2022Updated 4 years ago
- Bash one-liner that will parse harmj0y's SharpRoast or Rebeus kerberoast into hashcat crack-able format.☆32Feb 28, 2019Updated 7 years ago
- ☆15Feb 9, 2022Updated 4 years ago
- Exercises for C# Workshop at Wild West Hackin' Fest 2018 & 2019.☆64Oct 28, 2019Updated 6 years ago
- Configurations for DFIR ORC☆28Mar 28, 2024Updated last year
- Threat intelligence and threat detection indicators (IOC, IOA)☆52Nov 27, 2020Updated 5 years ago
- Implementation of the .NET Profiler DLL hijack in C#☆98Dec 14, 2018Updated 7 years ago