All Projects → attack_to_veris → Similar Projects or Alternatives

341 Open source projects that are alternatives of or similar to attack_to_veris

mitrecnd.github.io
MITRE Shield website
Stars: ✭ 17 (-69.64%)
mitreattack-python
A python module for working with ATT&CK
Stars: ✭ 208 (+271.43%)
attack-evals
ATT&CK Evaluations website (DEPRECATED)
Stars: ✭ 57 (+1.79%)
Reverse Engineering Tutorial
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
Stars: ✭ 5,763 (+10191.07%)
YAFRA
YAFRA is a semi-automated framework for analyzing and representing reports about IT Security incidents.
Stars: ✭ 22 (-60.71%)
Reverse-Engineering
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
Stars: ✭ 7,234 (+12817.86%)
Attack Navigator
Web app that provides basic navigation and annotation of ATT&CK matrices
Stars: ✭ 887 (+1483.93%)
Mutual labels:  cybersecurity, mitre-attack
Zeek-Network-Security-Monitor
A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the necessary hardware and setup and finally provide some examples of how you can use the power of Zeek to have absolute control over your network.
Stars: ✭ 38 (-32.14%)
Attack Scripts
Scripts and a (future) library to improve users' interactions with the ATT&CK content
Stars: ✭ 290 (+417.86%)
Mutual labels:  cybersecurity, mitre-attack
cycat-service
CyCAT.org API back-end server including crawlers
Stars: ✭ 25 (-55.36%)
Mutual labels:  cybersecurity, mitre-attack
attckr
⚔️MITRE ATT&CK Machinations in R
Stars: ✭ 22 (-60.71%)
Mutual labels:  cybersecurity, mitre-attack
Attack Website
MITRE ATT&CK Website
Stars: ✭ 231 (+312.5%)
Mutual labels:  cybersecurity, mitre-attack
Caldera
Automated Adversary Emulation Platform
Stars: ✭ 3,126 (+5482.14%)
Mutual labels:  cybersecurity, mitre-attack
Shuffle
Shuffle: A general purpose security automation platform platform. We focus on accessibility for all.
Stars: ✭ 424 (+657.14%)
Mutual labels:  cybersecurity, mitre-attack
Adversary emulation library
An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
Stars: ✭ 295 (+426.79%)
Mutual labels:  cybersecurity, mitre-attack
Abused-Legitimate-Services
Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups
Stars: ✭ 42 (-25%)
attack-stix-data
STIX data representing MITRE ATT&CK
Stars: ✭ 118 (+110.71%)
connectors
OpenCTI connectors
Stars: ✭ 135 (+141.07%)
Mutual labels:  cybersecurity, mitre-attack
Sentinel Attack
Tools to rapidly deploy a threat hunting capability on Azure Sentinel that leverages Sysmon and MITRE ATT&CK
Stars: ✭ 676 (+1107.14%)
Mutual labels:  cybersecurity, mitre-attack
Attack Control Framework Mappings
Security control framework mappings to MITRE ATT&CK provide a critically important resource for organizations to assess their security control coverage against real-world threats and provide a bridge for integrating ATT&CK-based threat information into the risk management process.
Stars: ✭ 115 (+105.36%)
Mutual labels:  cybersecurity, mitre-attack
DevSecOps
Ultimate DevSecOps library
Stars: ✭ 4,450 (+7846.43%)
Mutual labels:  cybersecurity
Malware-Zoo
Hashes of infamous malware
Stars: ✭ 18 (-67.86%)
Mutual labels:  cybersecurity
conti-pentester-guide-leak
Leaked pentesting manuals given to Conti ransomware crooks
Stars: ✭ 772 (+1278.57%)
Mutual labels:  cybersecurity
phisherprice
All In One Pentesting Tool For Recon & Auditing , Phone Number Lookup , Header , SSH Scan , SSL/TLS Scan & Much More.
Stars: ✭ 38 (-32.14%)
Mutual labels:  cybersecurity
ioc-scanner
Search a filesystem for indicators of compromise (IoC).
Stars: ✭ 31 (-44.64%)
Mutual labels:  cybersecurity
github-watchman
Monitoring GitHub for sensitive data shared publicly
Stars: ✭ 60 (+7.14%)
Mutual labels:  cybersecurity
phishEye
phishEye is an ultimate phishing tool in python. Includes popular websites like Facebook, Twitter, Instagram, LinkedIn, GitHub, Dropbox, and many others. Created with Flask, custom templates, and tunneled with ngrok and localhost.run.
Stars: ✭ 47 (-16.07%)
Mutual labels:  cybersecurity
jerseyctf-2021-challenges
JerseyCTF 2021
Stars: ✭ 22 (-60.71%)
Mutual labels:  cybersecurity
my-cybersecurity-notes
These are the notes i have been taking since i started learning about ethical hacking and cybersecurity
Stars: ✭ 13 (-76.79%)
Mutual labels:  cybersecurity
ehtk
Ethical Hacking Toolkit is a collection of tools, cheat sheets, and resources for Ethical hackers, Penetration Tester, and Security Researchers etc. It contains almost all tools mentioned in CEH, OSCP, eCPPT and PNPT
Stars: ✭ 59 (+5.36%)
Mutual labels:  cybersecurity
RdpCacheStitcher
RdpCacheStitcher is a tool that supports forensic analysts in reconstructing useful images out of RDP cache bitmaps.
Stars: ✭ 176 (+214.29%)
Mutual labels:  cybersecurity
Labtainers
Labtainers: A Docker-based cyber lab framework
Stars: ✭ 226 (+303.57%)
Mutual labels:  cybersecurity
marcellelee.github.io
No description or website provided.
Stars: ✭ 27 (-51.79%)
Mutual labels:  cybersecurity
CloudFrontier
Monitor the internet attack surface of various public cloud environments. Currently supports AWS, GCP, Azure, DigitalOcean and Oracle Cloud.
Stars: ✭ 102 (+82.14%)
Mutual labels:  cybersecurity
ADLES
Automated Deployment of Lab Environments System (ADLES)
Stars: ✭ 28 (-50%)
Mutual labels:  cybersecurity
conclave
Query compiler for secure multi-party computation.
Stars: ✭ 86 (+53.57%)
Mutual labels:  cybersecurity
cytrone
CyTrONE: Integrated Cybersecurity Training Framework
Stars: ✭ 72 (+28.57%)
Mutual labels:  cybersecurity
SSI Extra Materials
In my computer security courses I make extensive usage of cheatsheets for various tools and extra materials to complement the student learning if they are willing to do so. I have decided to share them to enable others to take advantage of them
Stars: ✭ 42 (-25%)
Mutual labels:  cybersecurity
tryhackme-ctf
TryHackMe CTFs writeups, notes, drafts, scrabbles, files and solutions.
Stars: ✭ 140 (+150%)
Mutual labels:  cybersecurity
DomainCAT
Domain Connectivity Analysis Tools to analyze aggregate connectivity patterns across a set of domains during security investigations
Stars: ✭ 34 (-39.29%)
Mutual labels:  cybersecurity
game-of-thrones-hacking-ctf
Game of Thrones hacking CTF (Capture the flag)
Stars: ✭ 57 (+1.79%)
Mutual labels:  cybersecurity
Intel-One
Command line tool for passive reconnaissance, able to gather and link public information to a target domain, company or individual. It can make intelligence gathering faster and more effective by drastically reducing manual user interaction. This is achieved through the engineering of a highly customisable single input to multiple output solutio…
Stars: ✭ 23 (-58.93%)
Mutual labels:  cybersecurity
reosploit
A Tool that Finds, Enumerates, and Exploits Reolink Cameras.
Stars: ✭ 89 (+58.93%)
Mutual labels:  cybersecurity
ezEmu
See adversary, do adversary: Simple execution of commands for defensive tuning/research (now with more ELF on the shelf)
Stars: ✭ 89 (+58.93%)
Mutual labels:  mitre-attack
cti-stix-generator
OASIS Cyber Threat Intelligence (CTI) TC: A tool for generating STIX content for prototyping and testing. https://github.com/oasis-open/cti-stix-generator
Stars: ✭ 27 (-51.79%)
Mutual labels:  cyber-threat-intelligence
ICS-Security-Products
Lists of products useful for ICS security
Stars: ✭ 78 (+39.29%)
Mutual labels:  cybersecurity
MOSP
A collaborative platform for creating, editing and sharing JSON objects.
Stars: ✭ 72 (+28.57%)
Mutual labels:  cybersecurity
awesome-executable-packing
A curated list of awesome resources related to executable packing
Stars: ✭ 720 (+1185.71%)
Mutual labels:  cybersecurity
awesome-cybersecurity-blueteam-cn
网络安全 · 攻防对抗 · 蓝队清单,中文版
Stars: ✭ 494 (+782.14%)
Mutual labels:  cybersecurity
pywhatcms
Unofficial WhatCMS API package
Stars: ✭ 42 (-25%)
Mutual labels:  cyber-threat-intelligence
security-stack-mappings
This project empowers defenders with independent data on which native security controls of leading technology platforms are most useful in defending against the adversary TTPs they care about.
Stars: ✭ 305 (+444.64%)
Mutual labels:  mitre-attack
py-scripts-other
A collection of some of my scripts
Stars: ✭ 79 (+41.07%)
Mutual labels:  cybersecurity
FSEC-VM
Backend logic implementation for Vulnerability Management System
Stars: ✭ 19 (-66.07%)
Mutual labels:  cybersecurity
Awesome-CyberSec-Resources
An awesome collection of curated Cyber Security resources(Books, Tutorials, Blogs, Podcasts, ...)
Stars: ✭ 273 (+387.5%)
Mutual labels:  cybersecurity
Ntlmrecon
Enumerate information from NTLM authentication enabled web endpoints 🔎
Stars: ✭ 252 (+350%)
Mutual labels:  cybersecurity
Hack4Squad
💀 A bash hacking and scanning framework.
Stars: ✭ 45 (-19.64%)
Mutual labels:  cybersecurity
PyIris
PyIris is a modular remote access trojan toolkit written in python targeting Windows and Linux systems.
Stars: ✭ 296 (+428.57%)
Mutual labels:  cybersecurity
Gnuradio
GNU Radio – the Free and Open Software Radio Ecosystem
Stars: ✭ 3,297 (+5787.5%)
Mutual labels:  cybersecurity
Payloads
Git All the Payloads! A collection of web attack payloads.
Stars: ✭ 2,862 (+5010.71%)
Mutual labels:  cybersecurity
CyberQueens
CyberQueens lesson materials - learning resources and exercises for aspiring reverse engineers, exploit developers, and hackers 👩‍💻👨‍💻
Stars: ✭ 30 (-46.43%)
Mutual labels:  cybersecurity
1-60 of 341 similar projects