Breach Report Collection Logo

Breach Report Collection

0
Free
Visit Website

A collection of companies that disclose adversary TTPs (Tactics, Techniques, and Procedures) after they have been breached, useful for analysis of intrusions launched by adversaries with measurable effects and impact. The collection includes a list of companies that have been breached, along with the breach date, adversary, and source of the information. The list includes well-known companies such as Microsoft, Cloudflare, Boeing, and many others, and provides valuable insights into the tactics and techniques used by adversaries.

FEATURES

ALTERNATIVES

RedEye is a visual analytic tool for enhancing Red and Blue Team operations.

Deception based detection techniques with MITRE ATT&CK mapping and Honey Resources.

Gathers Threat Intelligence Feeds from publicly available sources and provides detailed output in CSV format.

Repository of Yara Rules created by TjNel.

Cyber Intelligence Management Platform with threat tracking, forensic artifacts, and YARA rule storage.

An all-in-one email outreach platform for finding and connecting with professionals, with features for lead discovery, email verification, and cold email campaigns.

A free software that calculates the security ranking of Internet Service Providers to detect malicious activities.

A python3 application for querying sites hosting publicly pasted data and scanning for sensitive information.

PINNED