AT-AT (Attack Tree Analysis Tool) is a application that allows users to develop and analyze attack trees. The overall goal is to automatically generate a set of possible attack scenarios that can be used to provide guidance for how to improve the design of the system to which the attack tree belongs to.
☆29Aug 17, 2022Updated 3 years ago
Alternatives and similar repositories for AT-AT
Users that are interested in AT-AT are comparing it to the libraries listed below
Sorting:
- Threat Simulator for Enterprise Networks☆14May 14, 2022Updated 3 years ago
- Resilient Virtual Machine Monitor is a complete fault tolerance solution for type-I hypervisors adopting one of the most popular VMM arch…☆11Jul 30, 2020Updated 5 years ago
- A threat modeling tool that implements the Trike v2 methodology in Smalltalk☆16Nov 18, 2019Updated 6 years ago
- This repository contains various threat hunting tools written in Python and is documented in the series Python Threat Hunting Tools which…☆18Nov 16, 2023Updated 2 years ago
- ☆17Feb 11, 2025Updated last year
- ☆12Jan 5, 2021Updated 5 years ago
- ☆19Mar 3, 2026Updated 2 weeks ago
- Network Defender Toolkit☆18Jun 11, 2013Updated 12 years ago
- ☆10Apr 29, 2022Updated 3 years ago
- A MCP Server that provides browser access through playwright with "stealth mode" enabled.☆21Jun 29, 2025Updated 8 months ago
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆69Jun 25, 2025Updated 8 months ago
- DNS Dashboard for hunting and identifying beaconing☆16Jul 29, 2020Updated 5 years ago
- Code samples showing how to include data stored in Backblaze B2 in a RAG application☆11Sep 18, 2024Updated last year
- ☆11Apr 17, 2017Updated 8 years ago
- Threat Hunt Investigation Methodology and Procedure☆15Jul 11, 2022Updated 3 years ago
- A command line tool for comparing JSON files by degree of similarity.☆12Oct 28, 2019Updated 6 years ago
- A bunch of lua dissectors for Wireshark that support iNet-X and IENA packet formats☆17Jan 28, 2026Updated last month
- Cradlepoint ECM Command Line Interface☆11Mar 7, 2023Updated 3 years ago
- Generic Signature Format for SIEM Systems☆18Jul 25, 2023Updated 2 years ago
- Research on Commercial Space Projects☆18Oct 29, 2020Updated 5 years ago
- SLURM file generator for bogons with AS0 as origin☆10Dec 6, 2023Updated 2 years ago
- A Routing Policy Specification Language(RPSL) parser with a focus on speed and correctness.☆15Mar 15, 2026Updated last week
- Various BPF resources, tools, scripts and experiments created while learning more about the eBPF technology.☆21Jul 11, 2022Updated 3 years ago
- ☆13Jul 4, 2023Updated 2 years ago
- A curated list of awesome threat detection and hunting resources☆10Mar 23, 2018Updated 7 years ago
- ☆16May 15, 2025Updated 10 months ago
- ☆14Jul 9, 2024Updated last year
- A simple translator between the Horizion JSON format and the XMLTV format☆10Oct 24, 2022Updated 3 years ago
- Epimitheus is a tool that uses graphical database Neo4j for Windows Events visualization.☆19Mar 13, 2022Updated 4 years ago
- A project for building Linux && IoT Malware for fun and no-profit☆17Jan 24, 2025Updated last year
- Swipe Right On A New Peering Relationship☆15Jun 21, 2020Updated 5 years ago
- Audit Powershell and search from known keywords in history #Blueteam☆25Apr 22, 2020Updated 5 years ago
- An Incident Response tool that visualizes historic process execution evidence (based on Event ID 4688 - Process Creation Event) in a tree…☆60Jan 30, 2018Updated 8 years ago
- KernelGhost is a next-generation offensive security framework that combines stealthy eBPF-based rootkit capabilities with advanced hyperv…☆19Apr 2, 2025Updated 11 months ago
- My dot files and other profile settings☆18Feb 12, 2026Updated last month
- Windows Event Log viewer and analyzer☆19Nov 13, 2024Updated last year
- A script to connect to ARIN's RESTful API to create ROAs☆13Jul 8, 2025Updated 8 months ago
- Project Interoperability: A Start-Up Guide to Info Sharing☆29Nov 22, 2016Updated 9 years ago
- This repository contains examples of information security policies, GDPR protocols and an operational security guide with examples of bes…☆11Apr 6, 2023Updated 2 years ago