A curated collection of companies that have publicly disclosed adversary tactics, techniques, and procedures (TTPs) following security breaches. The resource provides structured information about various security incidents, including breach dates, identified adversaries, and source documentation. The collection serves as a reference for security professionals analyzing real-world attack patterns and methodologies used by threat actors. It includes data from notable organizations such as Microsoft, Cloudflare, Boeing, and other major companies that have experienced measurable security incidents. Each entry in the collection documents the specific tactics and techniques employed during the breach, providing insights into adversary behavior and attack vectors. The information is sourced from official breach reports, security advisories, and public disclosures made by the affected organizations. This resource supports threat intelligence analysis, incident response planning, and security research by offering documented examples of actual attack scenarios and their associated TTPs.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
Comprehensive endpoint protection platform providing unified visibility and security for cloud workloads, endpoints, and containers.
A comprehensive guide to developing an incident response capability through intelligence-based threat hunting, covering theoretical concepts and real-life scenarios.
A practical guide to developing a comprehensive security monitoring and incident response strategy, covering incident response fundamentals, threat analysis, and data analysis.
A comprehensive SQL injection cheat sheet covering various database management systems and techniques.
A comprehensive guide to understanding and responding to modern ransomware attacks, covering incident response, cyber threat intelligence, and forensic analysis.
Free and open-source cybersecurity training classes with multi-class learning paths for high-skill, high-pay job skills.
A comprehensive guide to using Metasploit, including searching for modules, specifying exploits and payloads, and using auxiliary modules.
A comprehensive guide to incident response, providing effective techniques for responding to advanced attacks against local and remote network resources.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.