a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations on decentralized finance
-
Updated
Jun 22, 2024 - JavaScript
a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations on decentralized finance
The security agent that fights back. Watches your Linux server from inside, detects threats with kernel-level eBPF, and stops them with on-device AI. Open-source, self-hosted, dry-run by default. Apache-2.0.
RAG pipeline security testing toolkit - 27 techniques across 6 kill chain phases, mapped to MITRE ATLAS
27 scope-enforced AI agents that run the full pentest kill-chain (recon → exploit → post-ex → DFIR → report) as a one-command Claude Code plugin. Backed by 754 MITRE-mapped skills.
This repository contains walkthroughs of Hack The Box machines I have completed
Real-Time Detection of Multi-Stage Attacks using Kill Chain State Machines: Detect multi-stage attacks by correlating alerts from Intrusion Detection Systems (IDS) to generate scenario graphs. By prioritising alerts based on the kill chain model the RT-KCSM reduces false-positive alerts.
MCADDF - A holistic operational framework bridging the gap between on-prem Active Directory and Cloud-native (Entra ID/Azure) security. This repository provides a structured library of verified attack vectors and detection logic, organized via the SERVTEP ID system and mapped to the current MITRE ATT&CK landscape. Curated by Pchelnikau Artur.
Navigator and Comparison Tool for Unified Kill Chain
🎯 Advanced Persistent Threat simulation | APT techniques | NullSec Framework | @anonantics
An open-standard shared vocabulary for categorizing and detecting human adversary behavior in physical security and insider threat. 154 tactics, 27 actor profiles, 4 target domains, with Cyber-Physical Nexus tagging where digital and physical threat intelligence converge. MIT licensed.
Python CLI that ingests alerts from CSV, Splunk, or Elasticsearch; enriches source IPs via VirusTotal and Shodan; scores priority with a 6-factor weighted model; detects correlated incidents and MITRE ATT&CK kill chains; and generates a self-contained HTML analyst report.
8 attack patterns in 9 bits — kernel-level kill chain detection using syscall bitmasks and eBPF
This repository contains walkthroughs of VulnHub machines I have completed
This repository contains walkthroughs of Root-Me Challenges I have completed
The Kill Chain Evolution of a Middle Eastern Threat Actor Intelligence from Seventeen Months of Deception and Analysis of Politically Targeted Malware Attacks
REVENANT - AI Agent Prompt Injection Kill Chain Detector
Automated L1/L2 SOC triage system. Real threat intel via AbuseIPDB + VirusTotal, kill-chain detection, auth.log ingestion, and a secured Flask dashboard.
This repository contains walkthroughs of TryHackMe machines I have completed
This repository contains walkthroughs of Hack The Box machines I have completed
Trustworthy attack-success measurement for LLM applications via multi-source evidence stratification (E0–E5) and conflict-driven retesting. Beyond LLM-as-a-Judge.
Add a description, image, and links to the kill-chain topic page so that developers can more easily learn about it.
To associate your repository with the kill-chain topic, visit your repo's landing page and select "manage topics."