xakepnz / enterpriseattackLinks
A lightweight Python module to interact with the MITRE ATT&CK® Enterprise dataset. Built for speed with minimal dependencies. Read the docs on GitLab for more info.
☆11Updated last week
Alternatives and similar repositories for enterpriseattack
Users that are interested in enterpriseattack are comparing it to the libraries listed below
Sorting:
- An extendable tool to extract and aggregate IoCs from threat feeds☆33Updated last year
- Check IOC provided by a MISP instance on Suricata events☆18Updated 6 years ago
- ☆22Updated 4 years ago
- Repository for scripts and tips for "Yara Scan Service"☆20Updated 2 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- XOR Key Extractor☆50Updated last year
- Manticore Adversary Emulation Cli☆48Updated 5 years ago
- Python parser for Red Canary's Atomic Red Team Yamls☆27Updated 6 years ago
- ☆43Updated last month
- A list of IOCs applicable to PoshC2☆24Updated 5 years ago
- Remote Desktop Client Fingerprint script for Zeek. Based off of https://github.com/0x4D31/fatt☆40Updated 2 years ago
- Modular command-line threat hunting tool & framework.☆17Updated 5 years ago
- Validates yara rules and tries to repair the broken ones.☆39Updated 4 years ago
- A collection of Indicators of Compromise (IoCs), most aligning with samples derived from the signatures in the YARA-Signatures repo☆30Updated 5 years ago
- Proof of concept communications from C# via a web browser process☆21Updated 6 years ago
- Tools related to work with Attack Flow (https://github.com/center-for-threat-informed-defense/attack-flow)☆44Updated 3 years ago
- ☆14Updated 7 years ago
- Zone transfers for rwhois☆20Updated 6 years ago
- This is a Ansible script for building a ready to go Cuckoo Sandbox server.☆25Updated 7 years ago
- SNIcat☆127Updated 3 years ago
- LetMeOutOfYour.net Resources☆20Updated 5 years ago
- C# User Simulation☆32Updated 2 years ago
- Python emulator for Excel XLM macros.☆18Updated 5 years ago
- s3eker is an extensible way to find open S3 buckets.☆17Updated 5 years ago
- Threat intelligence and threat detection indicators (IOC, IOA)☆52Updated 4 years ago
- Standardized Malware Analysis Tool☆53Updated 4 years ago
- Machine Interrogation To Identify Gaps & Techniques for Execution☆32Updated 3 years ago
- Tools for playing w/ CobaltStrike config - extractin, detection, processing, etc...☆30Updated 2 years ago
- ☆15Updated 3 years ago
- Yara rules☆22Updated 2 years ago