attack-evalsATT&CK Evaluations website (DEPRECATED)
Stars: ✭ 57 (+1.79%)
Reverse Engineering TutorialA FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
Stars: ✭ 5,763 (+10191.07%)
YAFRAYAFRA is a semi-automated framework for analyzing and representing reports about IT Security incidents.
Stars: ✭ 22 (-60.71%)
Reverse-EngineeringA FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
Stars: ✭ 7,234 (+12817.86%)
Attack NavigatorWeb app that provides basic navigation and annotation of ATT&CK matrices
Stars: ✭ 887 (+1483.93%)
Zeek-Network-Security-MonitorA Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the necessary hardware and setup and finally provide some examples of how you can use the power of Zeek to have absolute control over your network.
Stars: ✭ 38 (-32.14%)
Attack ScriptsScripts and a (future) library to improve users' interactions with the ATT&CK content
Stars: ✭ 290 (+417.86%)
cycat-serviceCyCAT.org API back-end server including crawlers
Stars: ✭ 25 (-55.36%)
attckr⚔️MITRE ATT&CK Machinations in R
Stars: ✭ 22 (-60.71%)
CalderaAutomated Adversary Emulation Platform
Stars: ✭ 3,126 (+5482.14%)
ShuffleShuffle: A general purpose security automation platform platform. We focus on accessibility for all.
Stars: ✭ 424 (+657.14%)
Adversary emulation libraryAn open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
Stars: ✭ 295 (+426.79%)
connectorsOpenCTI connectors
Stars: ✭ 135 (+141.07%)
Sentinel AttackTools to rapidly deploy a threat hunting capability on Azure Sentinel that leverages Sysmon and MITRE ATT&CK
Stars: ✭ 676 (+1107.14%)
Attack Control Framework MappingsSecurity control framework mappings to MITRE ATT&CK provide a critically important resource for organizations to assess their security control coverage against real-world threats and provide a bridge for integrating ATT&CK-based threat information into the risk management process.
Stars: ✭ 115 (+105.36%)
DevSecOpsUltimate DevSecOps library
Stars: ✭ 4,450 (+7846.43%)
Malware-ZooHashes of infamous malware
Stars: ✭ 18 (-67.86%)
phisherpriceAll In One Pentesting Tool For Recon & Auditing , Phone Number Lookup , Header , SSH Scan , SSL/TLS Scan & Much More.
Stars: ✭ 38 (-32.14%)
ioc-scannerSearch a filesystem for indicators of compromise (IoC).
Stars: ✭ 31 (-44.64%)
github-watchmanMonitoring GitHub for sensitive data shared publicly
Stars: ✭ 60 (+7.14%)
phishEyephishEye is an ultimate phishing tool in python. Includes popular websites like Facebook, Twitter, Instagram, LinkedIn, GitHub, Dropbox, and many others. Created with Flask, custom templates, and tunneled with ngrok and localhost.run.
Stars: ✭ 47 (-16.07%)
my-cybersecurity-notesThese are the notes i have been taking since i started learning about ethical hacking and cybersecurity
Stars: ✭ 13 (-76.79%)
ehtkEthical Hacking Toolkit is a collection of tools, cheat sheets, and resources for Ethical hackers, Penetration Tester, and Security Researchers etc. It contains almost all tools mentioned in CEH, OSCP, eCPPT and PNPT
Stars: ✭ 59 (+5.36%)
RdpCacheStitcherRdpCacheStitcher is a tool that supports forensic analysts in reconstructing useful images out of RDP cache bitmaps.
Stars: ✭ 176 (+214.29%)
LabtainersLabtainers: A Docker-based cyber lab framework
Stars: ✭ 226 (+303.57%)
CloudFrontierMonitor the internet attack surface of various public cloud environments. Currently supports AWS, GCP, Azure, DigitalOcean and Oracle Cloud.
Stars: ✭ 102 (+82.14%)
ADLESAutomated Deployment of Lab Environments System (ADLES)
Stars: ✭ 28 (-50%)
conclaveQuery compiler for secure multi-party computation.
Stars: ✭ 86 (+53.57%)
cytroneCyTrONE: Integrated Cybersecurity Training Framework
Stars: ✭ 72 (+28.57%)
SSI Extra MaterialsIn my computer security courses I make extensive usage of cheatsheets for various tools and extra materials to complement the student learning if they are willing to do so. I have decided to share them to enable others to take advantage of them
Stars: ✭ 42 (-25%)
tryhackme-ctfTryHackMe CTFs writeups, notes, drafts, scrabbles, files and solutions.
Stars: ✭ 140 (+150%)
DomainCATDomain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations
Stars: ✭ 34 (-39.29%)
Intel-OneCommand line tool for passive reconnaissance, able to gather and link public information to a target domain, company or individual. It can make intelligence gathering faster and more effective by drastically reducing manual user interaction. This is achieved through the engineering of a highly customisable single input to multiple output solutio…
Stars: ✭ 23 (-58.93%)
reosploitA Tool that Finds, Enumerates, and Exploits Reolink Cameras.
Stars: ✭ 89 (+58.93%)
ezEmuSee adversary, do adversary: Simple execution of commands for defensive tuning/research (now with more ELF on the shelf)
Stars: ✭ 89 (+58.93%)
cti-stix-generatorOASIS Cyber Threat Intelligence (CTI) TC: A tool for generating STIX content for prototyping and testing. https://github.com/oasis-open/cti-stix-generator
Stars: ✭ 27 (-51.79%)
MOSPA collaborative platform for creating, editing and sharing JSON objects.
Stars: ✭ 72 (+28.57%)
pywhatcmsUnofficial WhatCMS API package
Stars: ✭ 42 (-25%)
security-stack-mappingsThis project empowers defenders with independent data on which native security controls of leading technology platforms are most useful in defending against the adversary TTPs they care about.
Stars: ✭ 305 (+444.64%)
FSEC-VMBackend logic implementation for Vulnerability Management System
Stars: ✭ 19 (-66.07%)
Awesome-CyberSec-ResourcesAn awesome collection of curated Cyber Security resources(Books, Tutorials, Blogs, Podcasts, ...)
Stars: ✭ 273 (+387.5%)
NtlmreconEnumerate information from NTLM authentication enabled web endpoints 🔎
Stars: ✭ 252 (+350%)
Hack4Squad💀 A bash hacking and scanning framework.
Stars: ✭ 45 (-19.64%)
PyIrisPyIris is a modular remote access trojan toolkit written in python targeting Windows and Linux systems.
Stars: ✭ 296 (+428.57%)
GnuradioGNU Radio – the Free and Open Software Radio Ecosystem
Stars: ✭ 3,297 (+5787.5%)
PayloadsGit All the Payloads! A collection of web attack payloads.
Stars: ✭ 2,862 (+5010.71%)
CyberQueensCyberQueens lesson materials - learning resources and exercises for aspiring reverse engineers, exploit developers, and hackers 👩💻👨💻
Stars: ✭ 30 (-46.43%)