AT-AT (Attack Tree Analysis Tool) is a application that allows users to develop and analyze attack trees. The overall goal is to automatically generate a set of possible attack scenarios that can be used to provide guidance for how to improve the design of the system to which the attack tree belongs to.
☆30Aug 17, 2022Updated 3 years ago
Alternatives and similar repositories for AT-AT
Users that are interested in AT-AT are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Threat Simulator for Enterprise Networks☆14May 14, 2022Updated 3 years ago
- Resilient Virtual Machine Monitor is a complete fault tolerance solution for type-I hypervisors adopting one of the most popular VMM arch…☆11Jul 30, 2020Updated 5 years ago
- A threat modeling tool that implements the Trike v2 methodology in Smalltalk☆16Nov 18, 2019Updated 6 years ago
- This repository contains various threat hunting tools written in Python and is documented in the series Python Threat Hunting Tools which…☆18Nov 16, 2023Updated 2 years ago
- ☆12Jan 5, 2021Updated 5 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- ☆10Apr 29, 2022Updated 3 years ago
- ☆11Jun 2, 2016Updated 9 years ago
- A MCP Server that provides browser access through playwright with "stealth mode" enabled.☆22Jun 29, 2025Updated 9 months ago
- DNS Dashboard for hunting and identifying beaconing☆17Jul 29, 2020Updated 5 years ago
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆70Jun 25, 2025Updated 9 months ago
- Code samples showing how to include data stored in Backblaze B2 in a RAG application☆11Sep 18, 2024Updated last year
- Sigma rules converted for direct use with Zircolite☆14Updated this week
- Threat Hunt Investigation Methodology and Procedure☆15Jul 11, 2022Updated 3 years ago
- A command line tool for comparing JSON files by degree of similarity.☆12Oct 28, 2019Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A bunch of lua dissectors for Wireshark that support iNet-X and IENA packet formats☆17Jan 28, 2026Updated 2 months ago
- Home-Assistant custom integration adding a 1D Kalman filter☆12Dec 26, 2020Updated 5 years ago
- Cradlepoint ECM Command Line Interface☆11Mar 7, 2023Updated 3 years ago
- Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. The research…☆57Mar 2, 2026Updated last month
- Generic Signature Format for SIEM Systems☆18Jul 25, 2023Updated 2 years ago
- Research on Commercial Space Projects☆18Oct 29, 2020Updated 5 years ago
- 一个人的安全笔记。☆13Dec 2, 2021Updated 4 years ago
- SLURM file generator for bogons with AS0 as origin☆10Dec 6, 2023Updated 2 years ago
- Various BPF resources, tools, scripts and experiments created while learning more about the eBPF technology.☆21Jul 11, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A utility to parse and analyze Windows Event Log files for recurrent failure patterns☆19Jun 5, 2025Updated 10 months ago
- ☆13Jul 4, 2023Updated 2 years ago
- Generates runbooks for GuardDuty findings☆38Jun 24, 2024Updated last year
- A curated list of awesome threat detection and hunting resources☆10Mar 23, 2018Updated 8 years ago
- ☆16May 15, 2025Updated 11 months ago
- ☆14Jul 9, 2024Updated last year
- A simple translator between the Horizion JSON format and the XMLTV format☆10Oct 24, 2022Updated 3 years ago
- OpenCore EFI config for Dell XPS 8940 & possibly G5 5090☆10May 14, 2021Updated 4 years ago
- Malifar is a GPU-accelerated NSEC3 DNS zone dumper☆15Jun 4, 2024Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆21Aug 13, 2025Updated 8 months ago
- Audit Powershell and search from known keywords in history #Blueteam☆25Apr 22, 2020Updated 5 years ago
- An Incident Response tool that visualizes historic process execution evidence (based on Event ID 4688 - Process Creation Event) in a tree…☆60Jan 30, 2018Updated 8 years ago
- KernelGhost is a next-generation offensive security framework that combines stealthy eBPF-based rootkit capabilities with advanced hyperv…☆23Apr 2, 2025Updated last year
- T&C and Privacy Policy for our website: https://radicallyopensecurity.com/☆17Dec 9, 2024Updated last year
- Windows Event Log viewer and analyzer☆19Nov 13, 2024Updated last year
- Slides for the talk we presented as UniPi at DefCon's Red Team Village☆23Aug 14, 2022Updated 3 years ago