yathuvaran / AT-ATView external linksLinks
AT-AT (Attack Tree Analysis Tool) is a application that allows users to develop and analyze attack trees. The overall goal is to automatically generate a set of possible attack scenarios that can be used to provide guidance for how to improve the design of the system to which the attack tree belongs to.
☆29Aug 17, 2022Updated 3 years ago
Alternatives and similar repositories for AT-AT
Users that are interested in AT-AT are comparing it to the libraries listed below
Sorting:
- Threat Simulator for Enterprise Networks☆14May 14, 2022Updated 3 years ago
- This repository contains various threat hunting tools written in Python and is documented in the series Python Threat Hunting Tools which…☆18Nov 16, 2023Updated 2 years ago
- One Day of Python for SaintCon 2022☆11Jan 3, 2023Updated 3 years ago
- Cradlepoint ECM Command Line Interface☆11Mar 7, 2023Updated 2 years ago
- Resilient Virtual Machine Monitor is a complete fault tolerance solution for type-I hypervisors adopting one of the most popular VMM arch…☆11Jul 30, 2020Updated 5 years ago
- Sightings Ecosystem gives cyber defenders visibility into what adversaries actually do in the wild. With your help, we are tracking MITRE…☆38May 28, 2025Updated 8 months ago
- Sample data generator for the Splunk for Palo Alto Networks app.☆12Sep 25, 2016Updated 9 years ago
- Malifar is a GPU-accelerated NSEC3 DNS zone dumper☆14Jun 4, 2024Updated last year
- Queries from the blog posts.☆15Oct 6, 2024Updated last year
- The Eureka Lab Series is designed for learners at all levels of experience and interest in security concepts and technologies.☆10Nov 30, 2025Updated 2 months ago
- This is a script to import Cisco Talos's IP Blacklist into a Tag (Host Group) within Stealthwatch. This will also optionally create a Cu…☆11May 22, 2023Updated 2 years ago
- The dataset was used as a support to attack obfuscations. It is the largest obfuscated dataset, with realistic and various binaries and f…☆19Jan 15, 2026Updated last month
- A tool for auditing network shares in an Active Directory environment☆44Apr 29, 2019Updated 6 years ago
- Tools for hunting security threats☆12Feb 4, 2020Updated 6 years ago
- Offline Active Directory Domain Services (AD DS) Join☆12Jan 4, 2017Updated 9 years ago
- GUI for regripper☆11Mar 19, 2019Updated 6 years ago
- A bunch of lua dissectors for Wireshark that support iNet-X and IENA packet formats☆16Jan 28, 2026Updated 2 weeks ago
- ☆18Jan 8, 2026Updated last month
- ☆11Jun 2, 2016Updated 9 years ago
- Quick starter kit based on trixion and webpack☆11Dec 17, 2016Updated 9 years ago
- ☆11Apr 17, 2017Updated 8 years ago
- HoneyDB Python Module☆14Feb 6, 2024Updated 2 years ago
- ☆13Jul 4, 2023Updated 2 years ago
- Tailscale System(d) (bootable) container for use with Podman Machine, Podman Desktop, MicroShift and OpenShift Local installations☆12Dec 30, 2024Updated last year
- Smart weather dashboard. Integrates with OpenWeatherMaps and Ecobee. Designed to run on RaspberryPi.☆15Aug 19, 2023Updated 2 years ago
- Technical cyber security resources across the NIST cyber security framework lifecycle☆11Apr 28, 2021Updated 4 years ago
- Code samples showing how to include data stored in Backblaze B2 in a RAG application☆11Sep 18, 2024Updated last year
- (Unofficial) Python API for https://sslbl.abuse.ch/☆11Dec 9, 2016Updated 9 years ago
- SLURM file generator for bogons with AS0 as origin☆10Dec 6, 2023Updated 2 years ago
- ☆10May 6, 2023Updated 2 years ago
- Project to Support The Hunter's Framework (THF)☆11Apr 16, 2024Updated last year
- The goal of this repository is to accelerate Azure OpenAI service adoption and put an enterprise governance structure around it using Azu…☆12Sep 13, 2023Updated 2 years ago
- A curated list of awesome threat detection and hunting resources☆10Mar 23, 2018Updated 7 years ago
- ☆12Jan 17, 2026Updated 3 weeks ago
- ☆11Jan 5, 2021Updated 5 years ago
- This repository provide a json file for all Windows security Event IDs with lot of useful informations (Categories, GPO, Volume, Recomman…☆11Mar 2, 2023Updated 2 years ago
- Project Interoperability: A Start-Up Guide to Info Sharing☆29Nov 22, 2016Updated 9 years ago
- An Incident Response tool that visualizes historic process execution evidence (based on Event ID 4688 - Process Creation Event) in a tree…☆60Jan 30, 2018Updated 8 years ago
- Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. The research…☆55Updated this week