Maltego-ATTCK
enterpriseattack
Maltego-ATTCK | enterpriseattack | |
---|---|---|
1 | 1 | |
0 | 9 | |
- | - | |
0.0 | 2.7 | |
almost 2 years ago | 20 days ago | |
Python | Python | |
- | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Maltego-ATTCK
enterpriseattack
What are some alternatives?
Atomic-Red-Team-Intelligence-C2 - ARTi-C2 is a post-exploitation framework used to execute Atomic Red Team test cases with rapid payload deployment and execution capabilities via .NET's DLR.
CyberSecurityAuditScript - Security audit script decreases info gathering from average of 5 minutes, to 20 seconds, and returns everything into a textfile.
maltego-transformation-template - A template for standard Maltego transformation
ti_scraper - Highly configurable scripts for a web scraper intended to be used for cyber threat intelligence
maigret-maltego - Maltego transformation for searching of accounts by username
attack-control-framework-mappings - 🚨ATTENTION🚨 The NIST 800-53 mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here as an archive.
MISP-maltego - Set of Maltego transforms to inferface with a MISP Threat Sharing instance, and also to explore the whole MITRE ATT&CK dataset.
Incident-Playbook - GOAL: Incident Response Playbooks Mapped to MITRE Attack Tactics and Techniques. [Contributors Friendly]
maltego-transforms-list - A list of tools that handle different data and make it usable in Maltego.
IntelOwl - IntelOwl: manage your Threat Intelligence at scale
caldera - Automated Adversary Emulation Platform