There are 1 repository under ttp topic.
A collection of sources of documentation, as well as field best practices, to build/run a SOC
A web application that assists network defenders, analysts, and researchers in the process of mapping adversary behaviors to the MITRE ATT&CK® framework.
MAAD Attack Framework - An attack tool for simple, fast & effective security testing of M365 & Entra ID (Azure AD).
This repository contains cutting-edge open-source security notes and tools that will help you during your Red Team assessments.
Repository created to share information about tactics, techniques and procedures used by threat actors. Initially with ransomware groups and evolving to other types of threats.
Halberd : Multi-Cloud Agentic Attack Tool
This repository contains indicators of compromise (IOCs) of our various investigations.
Generate MITRE ATT&CK and D3FEND from a list of CVEs. Database with CVE, CWE, CAPEC, MITRE ATT&CK and D3FEND Techniques data is updated daily. Showcased at BlackHat Europe 2025 Arsenal.
A collection of intelligence about Log4Shell and its exploitation activity.
Python script for periodically fetching appointment dates from the Trusted Traveler Program API for Global Entry, Nexus, SENTRI, and FAST, with notifications to the user when new appointments are discovered.
Adversary emulation for EDR/SIEM testing (macOS/Linux)
PoC showcasing new DarkGate Install Script retrieval technique via DNS TXT Record
TTP template for Cisco IOS "show run"
This central repository is crafted for cybersecurity enthusiasts, researchers, and professionals aiming to advance their skills. It offers valuable resources for those focused on analyzing and understanding different types of malware.
A collection of commands, tools, techniques and procedures of the purplestorm ctf team.
Wiki to collect Red Team infrastructure hardening resources
Official Black Hat Arsenal Security Tools Repository
Parsing some nokia SROS show outputs using ttp
A compiler/assembler for files written in ttpasm to work with Tak's Toy Processor.
A compilation of Tactics, Techniques, and Procedures (TTPs) employed by ransomware groups over the past five years.
Pentesting checklists for various engagements
Lynis - Security auditing tool for Linux, macOS, and UNIX-based systems. Assists with compliance testing (HIPAA/ISO27001/PCI DSS) and system hardening. Agentless, and installation optional.
Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) remote administration and post-exploitation tool mainly written in python
A resource containing all the data each ransomware gangs
Use the Prowl API to obtain IP Reputation, Techniques Tactics and Procedures, Indicators of Attacks and Indicators of Compromise related to a public IP.
Docker-compose files for the open-source tools E-PIX gPAS and gICS. Use these containers to implement your Trusted Third-Party
:whale: A curated list of Docker resources and projects
My musings with C#
An intelligence focused mapping tool to help network defenders and threat intelligence in the process of mapping adversarial behaviors to make meaningful and informed command decisions.
Cyber Attacks Mitigation
A tool for monitoring interview slots for Trusted Traveler Programs such as Global Entry.