Stars
GOAL: Incident Response Playbooks Mapped to MITRE Attack Tactics and Techniques. [Contributors Friendly]
YARA signature and IOC database for my scanners and tools
An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
🚨ATTENTION🚨 The NIST 800-53 mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here as an archive.
Collection of resources related to the Center for Threat-Informed Defense
Dados diários mais recentes do coronavírus por município brasileiro
An Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.
This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.
Attack and defend active directory using modern post exploitation adversary tradecraft activity
Scripts for the Ghidra software reverse engineering suite.
Builds malware analysis Windows VMs so that you don't have to.
MISP (core software) - Open Source Threat Intelligence and Sharing Platform
Security Onion Elastic Stack
Cyber Threat Intelligence Repository expressed in STIX 2.0
Sysmon configuration file template with default high-quality event tracing
Pcap editing and replay tools for *NIX and Windows - Users please download source from
Fast, multi-protocol credential brute-forcer. Parses Nmap, Nessus, and Nexpose output to automatically test default and custom credentials across 28 protocols.
Organon's mirror. Hosts, pkgconfig, databases and tools
Security Onion 16.04 - Linux distro for threat hunting, enterprise security monitoring, and log management
Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis.
CTF write-ups by Plaid Parliament of Pwning
A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering environment on a VM.