PCAP-ATTACK is a container of PCAP captures mapped to the relevant attack tactic. It provides a comprehensive view of the attack, allowing analysts to quickly identify the tactics, techniques, and procedures (TTPs) used in the attack. This tool helps analysts to identify the attack tactics, techniques, and procedures (TTPs) used in the attack, and to map the PCAP captures to the relevant attack tactic. It is a powerful tool for incident responders and threat hunters to quickly identify and analyze the attack.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
Advanced threat prevention and detection platform leveraging Deep CDR, Multiscanning, and Sandbox technologies to protect against data breaches and ransom attacks.
InSights by InQuest is a threat intelligence platform that delivers curated feeds of IOCs and C2 information to help security teams detect and respond to emerging threats.
Lists of sources and utilities to hunt, detect, and prevent evildoers.
Threat hunting tool leveraging Windows events for identifying outliers and suspicious behavior.
A comprehensive list of APT groups and operations for tracking and mapping different names and naming schemes used by cybersecurity companies and antivirus vendors.
An informational repo about hunting for adversaries in your IT environment.
A collection of YARA rules for research and hunting purposes.
Create deceptive webpages to deceive and redirect attackers away from real websites by cloning them.
yarAnalyzer creates statistics on a yara rule set and files in a sample directory, generating tables and CSV files, including an inventory feature.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.