Lists (16)
Sort Name ascending (A-Z)
ATLAS Adversarial ML
AI/ML Security: MITRE ATLAS (atlas.mitre.org) + OWASP LLM Top 10 + Google SAIF. Covers prompt injection, model tampering, data poisoning, agent security, privac28 repositories
TA0001 Initial Access
Initial Access (TA0001): Gaining initial foothold in target networks. Includes phishing, exploiting public-facing apps, supply chain compromise, valid accounts. https://attack.mitre.org/tactics/TA000160 repositories
TA0002 Execution
Execution (TA0002): Running malicious code on target systems. Includes command interpreters, scripting, native APIs, exploitation for client execution. https://attack.mitre.org/tactics/TA0002319 repositories
TA0003 Persistence
Persistence (TA0003): Maintaining access across restarts and credential changes. Includes registry run keys, scheduled tasks, bootkit, implants, account manipulation. https://attack.mitre.org/tactics/TA000334 repositories
TA0004 Privilege Escalation
Privilege Escalation (TA0004): Gaining higher-level permissions. Includes exploitation, access token manipulation, UAC bypass, AD escalation, sudo/setuid abuse. https://attack.mitre.org/tactics/TA000492 repositories
TA0005 Defense Evasion
Defense Evasion (TA0005): Avoiding detection. Includes obfuscation, disabling security tools, process injection, masquerading, AMSI/ETW bypass, rootkits. https://attack.mitre.org/tactics/TA0005325 repositories
TA0006 Credential Access
Credential Access (TA0006): Stealing credentials. Includes password dumping, Kerberoasting, credential harvesting, brute force, keylogging, LSASS access. https://attack.mitre.org/tactics/TA0006135 repositories
TA0007 Discovery
Discovery (TA0007): Understanding target environment. Includes network enumeration, AD recon, system info gathering, account discovery, BloodHound. https://attack.mitre.org/tactics/TA0007151 repositories
TA0008 Lateral Movement
Lateral Movement (TA0008): Moving through the network. Includes pass-the-hash, RDP, SMB/WMI exec, SSH tunneling, pivoting, proxychains. https://attack.mitre.org/tactics/TA000878 repositories
TA0009 Collection
Collection (TA0009): Gathering target data. Includes screen capture, keylogging, email harvesting, clipboard data, memory dumping, secret scanning. https://attack.mitre.org/tactics/TA000921 repositories
TA0010 Exfiltration
Exfiltration (TA0010): Stealing data from target. Includes covert channels, DNS tunneling, steganography, encrypted transfers, cloud storage abuse. https://attack.mitre.org/tactics/TA001010 repositories
TA0011 Command and Control (C2)
Command and Control (TA0011): Communicating with compromised systems. Includes C2 frameworks (Cobalt Strike, Sliver), domain fronting, protocol tunneling. https://attack.mitre.org/tactics/TA0011247 repositories
TA0040 Impact
Impact (TA0040): Disrupting availability or integrity. Includes ransomware, data destruction, defacement, resource hijacking, service disruption. https://attack.mitre.org/tactics/TA00406 repositories
TA0042 Resource Development
Resource Development (TA0042): Building attack infrastructure. Includes payload development, infrastructure setup, capability acquisition, tool compilation. https://attack.mitre.org/tactics/TA0042415 repositories
TA0043 Reconnaissance
Reconnaissance (TA0043): Gathering target information. Includes OSINT, subdomain enumeration, network scanning, social engineering research. https://attack.mitre.org/tactics/TA0043168 repositories
Threat Hunting
Threat Hunting related repositories123 repositories
- All languages
- Assembly
- AutoIt
- Awk
- Batchfile
- Bicep
- BlitzBasic
- Boo
- C
- C#
- C++
- CSS
- Dockerfile
- Elixir
- F#
- Fortran
- GDScript
- Gherkin
- Gnuplot
- Go
- HCL
- HTML
- Hack
- Handlebars
- Inno Setup
- Java
- JavaScript
- Jinja
- Julia
- Jupyter Notebook
- Just
- KiCad Layout
- Kotlin
- Lua
- MDX
- Makefile
- Markdown
- Nim
- OCaml
- Objective-C
- Odin
- Open Policy Agent
- PHP
- Pascal
- Perl
- PowerShell
- Pug
- Puppet
- Python
- QML
- R
- Rich Text Format
- Roff
- Ruby
- Rust
- SCSS
- Self
- Shell
- Smarty
- Svelte
- Swift
- TSQL
- TeX
- TypeScript
- VBA
- VBScript
- Vala
- Verilog
- Vim Script
- Visual Basic
- Visual Basic .NET
- Visual Basic 6.0
- Vue
- XSLT
- YAML
- YARA
- Zig
Starred repositories
8
stars
written in Objective-C
Clear filter
Training neural networks on Apple Neural Engine via reverse-engineered private APIs
Prevents your Mac from going to sleep.
A Mac OS X forensic utility which manages file system mounting in support of forensic procedures.
Colloquy is an advanced IRC, SILC & ICB client for macOS and iOS! Latest Mac builds: https://github.com/colloquy/colloquy/releases
Objective-C library and console to interact with Heimdal APIs for macOS Kerberos
Disables the new scroll acceleration introduced in Mac OS 10.8 (Mountain Lion)
Displays the current time on your macOS desktop