Visit Website

Lists of sources and utilities to hunt, detect, and prevent evildoers. Resources include AD Security, Microsoft EMET, Microsoft ATA, Microsoft File Screening, Threat Hunting, PowerShell Log hunting, and more.

FEATURES

ALTERNATIVES

Automatically curate open-source Yara rules and run scans with YAYA.

A daily updated summary of security advisories from various sources

CLI tool for ThreatCrowd.org with multiple query functions.

Globally-accessible knowledge base of adversary tactics and techniques for cybersecurity.

A Splunk app mapped to MITRE ATT&CK to guide threat hunts.

Container of 200 Windows EVTX samples for testing detection scripts and training on DFIR.

Repository of YARA rules for identifying and classifying malware.

A PowerShell script to interact with the MITRE ATT&CK Framework via its own API using the deprecated MediaWiki API.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved