All Projects → attack-stix-data → Similar Projects or Alternatives

419 Open source projects that are alternatives of or similar to attack-stix-data

mitrecnd.github.io
MITRE Shield website
Stars: ✭ 17 (-85.59%)
attack-evals
ATT&CK Evaluations website (DEPRECATED)
Stars: ✭ 57 (-51.69%)
mitreattack-python
A python module for working with ATT&CK
Stars: ✭ 208 (+76.27%)
Abused-Legitimate-Services
Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups
Stars: ✭ 42 (-64.41%)
cti-stix-generator
OASIS Cyber Threat Intelligence (CTI) TC: A tool for generating STIX content for prototyping and testing. https://github.com/oasis-open/cti-stix-generator
Stars: ✭ 27 (-77.12%)
Mutual labels:  stix, cti, cyber-threat-intelligence
cti-pattern-validator
OASIS TC Open Repository: Validate patterns used to express cyber observable content in STIX Indicators
Stars: ✭ 18 (-84.75%)
Mutual labels:  stix, cti, cyber-threat-intelligence
Misp
MISP (core software) - Open Source Threat Intelligence and Sharing Platform
Stars: ✭ 3,485 (+2853.39%)
Mutual labels:  cybersecurity, stix, cti
cti-stix2-json-schemas
OASIS TC Open Repository: Non-normative schemas and examples for STIX 2
Stars: ✭ 75 (-36.44%)
Mutual labels:  stix, cti, cyber-threat-intelligence
stix-icons
stix-icons is a collection of colourful and clean icons for use in software, training and marketing material to visualize cyber threats according to the STIX language for intelligence exchange, defined by OASIS Cyber Threat Intelligence (CTI) TC
Stars: ✭ 14 (-88.14%)
Mutual labels:  stix, cti, cyber-threat-intelligence
cti-stix-elevator
OASIS Cyber Threat Intelligence (CTI) TC Open Repository: Convert STIX 1.2 XML to STIX 2.x JSON
Stars: ✭ 42 (-64.41%)
Mutual labels:  stix, cti, cyber-threat-intelligence
Kali-Linux-Tools-Interface
Graphical Web interface developed to facilitate the use of security information tools.
Stars: ✭ 169 (+43.22%)
Mutual labels:  attack, cybersecurity
awesome-ddos-tools
Collection of several DDos tools.
Stars: ✭ 75 (-36.44%)
Mutual labels:  attack, cybersecurity
connectors
OpenCTI connectors
Stars: ✭ 135 (+14.41%)
Mutual labels:  cybersecurity, cti
YAFRA
YAFRA is a semi-automated framework for analyzing and representing reports about IT Security incidents.
Stars: ✭ 22 (-81.36%)
Opencti
Authors
Stars: ✭ 2,165 (+1734.75%)
Mutual labels:  cybersecurity, cti
Reverse-Engineering
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
Stars: ✭ 7,234 (+6030.51%)
client-python
OpenCTI Python Client
Stars: ✭ 45 (-61.86%)
Mutual labels:  cybersecurity, cti
Caldera
Automated Adversary Emulation Platform
Stars: ✭ 3,126 (+2549.15%)
Mutual labels:  cybersecurity, mitre-corporation
Open-source-tools-for-CTI
Public Repository of Open Source Tools for Cyber Threat Intelligence Analysts and Researchers
Stars: ✭ 91 (-22.88%)
Mutual labels:  cybersecurity, cti
Spiderfoot
SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
Stars: ✭ 6,882 (+5732.2%)
Mutual labels:  cybersecurity, cti
Awesome Cybersecurity Datasets
A curated list of amazingly awesome Cybersecurity datasets
Stars: ✭ 380 (+222.03%)
Mutual labels:  attack, cybersecurity
Zeek-Network-Security-Monitor
A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the necessary hardware and setup and finally provide some examples of how you can use the power of Zeek to have absolute control over your network.
Stars: ✭ 38 (-67.8%)
cycat-service
CyCAT.org API back-end server including crawlers
Stars: ✭ 25 (-78.81%)
Mutual labels:  cybersecurity, cti
Reverse Engineering Tutorial
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
Stars: ✭ 5,763 (+4783.9%)
ThePhish
ThePhish: an automated phishing email analysis tool
Stars: ✭ 676 (+472.88%)
Mutual labels:  attack, cybersecurity
attack to veris
The principal objectives and outputs of this project are the creation and dissemination of an extension to the VERIS schema incorporating ATT&CK mappings and associated usage documentation.
Stars: ✭ 56 (-52.54%)
TIGER
Python toolbox to evaluate graph vulnerability and robustness (CIKM 2021)
Stars: ✭ 103 (-12.71%)
Mutual labels:  attack
Benny-Edition-CTI-0.97-Zerty-Modification
Modification of BECTI made by zerty for the JMW Arma 3 server
Stars: ✭ 36 (-69.49%)
Mutual labels:  cti
refluxion
Refluxion -- MITM WPA attacks tool
Stars: ✭ 25 (-78.81%)
Mutual labels:  attack
know your ip
Know Your IP: Get location, blacklist status, shodan and censys results, and more.
Stars: ✭ 16 (-86.44%)
Mutual labels:  cybersecurity
sgx-tutorial-space18
Tutorial: Uncovering and mitigating side-channel leakage in Intel SGX enclaves
Stars: ✭ 44 (-62.71%)
Mutual labels:  attack
digital-copyright
Stamp your code with a trackable digital copyright
Stars: ✭ 17 (-85.59%)
Mutual labels:  cybersecurity
linkedin-employee-scraper
Extract all employees from LinkedIn. Especially useful for companies with thousands of employees.
Stars: ✭ 16 (-86.44%)
Mutual labels:  cybersecurity
WPCracker
WordPress pentest tool
Stars: ✭ 34 (-71.19%)
Mutual labels:  attack
Lucifer
A Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More... Use Or Build Automation Modules To Speed Up Your Cyber Security Life
Stars: ✭ 302 (+155.93%)
Mutual labels:  cybersecurity
icestick-lpc-tpm-sniffer
FPGA-based LPC bus sniffing tool for Lattice iCEstick Evaluation Kit
Stars: ✭ 41 (-65.25%)
Mutual labels:  attack
EventTranscriptParser
Python based tool to extract forensic info from EventTranscript.db (Windows Diagnostic Data)
Stars: ✭ 22 (-81.36%)
Mutual labels:  cybersecurity
Malicious-Urlv5
A multi-layered and multi-tiered Machine Learning security solution, it supports always on detection system, Django REST framework used, equipped with a web-browser extension that uses a REST API call.
Stars: ✭ 35 (-70.34%)
Mutual labels:  cybersecurity
TheRoadOfSO
学习安全运营的记录 | The knowledge base of security operation
Stars: ✭ 286 (+142.37%)
Mutual labels:  cybersecurity
haaukins
A Highly Accessible and Automated Virtualization Platform for Security Education
Stars: ✭ 148 (+25.42%)
Mutual labels:  cybersecurity
haiti
🔑 Hash type identifier (CLI & lib)
Stars: ✭ 287 (+143.22%)
Mutual labels:  cybersecurity
censys-recon-ng
recon-ng modules for Censys
Stars: ✭ 29 (-75.42%)
Mutual labels:  cybersecurity
cuc-ns
网络安全课本
Stars: ✭ 42 (-64.41%)
Mutual labels:  cybersecurity
csn09112
CSN09112 Module
Stars: ✭ 15 (-87.29%)
Mutual labels:  cybersecurity
Jasmin-Ransomware
Jasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security researchers to overcome the risk of external attacks.
Stars: ✭ 84 (-28.81%)
Mutual labels:  cybersecurity
MurMurHash
This little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform.
Stars: ✭ 79 (-33.05%)
Mutual labels:  cybersecurity
PassLock
PassLock is a medium-security password manager that encrypts passwords using Advanced Encryption Standards (AES)
Stars: ✭ 44 (-62.71%)
Mutual labels:  cybersecurity
ad-privileged-audit
Provides various Windows Server Active Directory (AD) security-focused reports.
Stars: ✭ 42 (-64.41%)
Mutual labels:  cybersecurity
SuperLibrary
Information Security Library
Stars: ✭ 60 (-49.15%)
Mutual labels:  cybersecurity
stix2patterns translator
Translate STIX 2 Patterning Queries
Stars: ✭ 25 (-78.81%)
Mutual labels:  stix
RedBook
基于Threathunting-book基础上完善的狩猎视角红队handbook
Stars: ✭ 56 (-52.54%)
Mutual labels:  cybersecurity
ictcore
ICTCore: Unified Communications Framework for web developers. Communications APIs for voice calls, SMS messaging, Fax communications and Emails
Stars: ✭ 18 (-84.75%)
Mutual labels:  cti
adv-dnn-ens-malware
adversarial examples, adversarial malware examples, adversarial malware detection, adversarial deep ensemble, Android malware variants
Stars: ✭ 33 (-72.03%)
Mutual labels:  cybersecurity
Blue-Team-Notes
You didn't think I'd go and leave the blue team out, right?
Stars: ✭ 899 (+661.86%)
Mutual labels:  cybersecurity
SecurityInterviewGuide
网络信息安全从业者面试指南
Stars: ✭ 791 (+570.34%)
Mutual labels:  cybersecurity
ArmorLib
Easily scan files for threats to security and privacy. A Rust library and command line tool. WIP.
Stars: ✭ 20 (-83.05%)
Mutual labels:  cybersecurity
jpeg-defense
SHIELD: Fast, Practical Defense and Vaccination for Deep Learning using JPEG Compression
Stars: ✭ 82 (-30.51%)
Mutual labels:  attack
Malware-Sample-Sources
Malware Sample Sources
Stars: ✭ 214 (+81.36%)
Mutual labels:  cybersecurity
URL-obfuscator
Python Program to obfuscate URLs to make Phishing attacks more difficult to detect. Uses Active open redirect list and other URL obfuscation techniques.
Stars: ✭ 101 (-14.41%)
Mutual labels:  cybersecurity
recommendations-for-engineers
All of my recommendations for aspiring engineers in a single place, coming from various areas of interest.
Stars: ✭ 81 (-31.36%)
Mutual labels:  cybersecurity
1-60 of 419 similar projects