There are 1 repository under ttp topic.
A collection of sources of documentation, as well as field best practices, to build/run a SOC
A web application that assists network defenders, analysts, and researchers in the process of mapping adversary behaviors to the MITRE ATT&CK® framework.
MAAD Attack Framework - An attack tool for simple, fast & effective security testing of M365 & Entra ID (Azure AD).
This repository contains indicators of compromise (IOCs) of our various investigations.
A collection of intelligence about Log4Shell and its exploitation activity.
Repository created to share information about tactics, techniques and procedures used by threat actors. Initially with ransomware groups and evolving to other types of threats.
This repository contains cutting-edge open-source security notes and tools that will help you during your Red Team assessments.
Python script for periodically fetching appointment dates from the Trusted Traveler Program API for Global Entry, Nexus, SENTRI, and FAST, with notifications to the user when new appointments are discovered.
PoC showcasing new DarkGate Install Script retrieval technique via DNS TXT Record
Adversary emulation for EDR/SIEM testing (macOS/Linux)
TTP template for Cisco IOS "show run"
Security testing tool to proactively assess cloud security by executing a comprehensive array of attack techniques across multiple surfaces via a simple web interface.
Official Black Hat Arsenal Security Tools Repository
Wiki to collect Red Team infrastructure hardening resources
A collection of commands, tools, techniques and procedures of the purplestorm ctf team.
Parsing some nokia SROS show outputs using ttp
A compiler/assembler for files written in ttpasm to work with Tak's Toy Processor.
Pentesting checklists for various engagements
Lynis - Security auditing tool for Linux, macOS, and UNIX-based systems. Assists with compliance testing (HIPAA/ISO27001/PCI DSS) and system hardening. Agentless, and installation optional.
Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) remote administration and post-exploitation tool mainly written in python
Use the Prowl API to obtain IP Reputation, Techniques Tactics and Procedures, Indicators of Attacks and Indicators of Compromise related to a public IP.
Docker-compose files for the open-source tools E-PIX gPAS and gICS. Use these containers to implement your Trusted Third-Party
Welcome to the Malware Analysis Toolkit repository, your comprehensive resource for dissecting and understanding the intricate world of malware. This repository is dedicated to providing in-depth technical analysis of various malware strains, equipping security professionals, researchers, and enthusiasts with the knowledge
:whale: A curated list of Docker resources and projects
My musings with C#
A compilation of Tactics, Techniques, and Procedures (TTPs) employed by ransomware groups over the past five years.
...更新中
Queens College Tech Talent Pipeline Winter Bootcamp Projects
A tool for monitoring interview slots for Trusted Traveler Programs such as Global Entry.
Cyber Attacks Mitigation
Capture/Extract data using a specific line from your log data in order to have only desired data.