Dark Mode

Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings
#

threat-analysis

Here are 147 public repositories matching this topic...

Advanced Sysmon ATT&CK configuration focusing on Detecting the Most Techniques per Data source in MITRE ATT&CK, Provide Visibility into Forensic Artifact Events for UEBA, Detect Exploitation events with wide CVE Coverage, and Risk Scoring of CVE, UEBA, Forensic, and MITRE ATT&CK Events.

  • Updated Nov 5, 2023
  • PowerShell

Yi Ge Ji Cheng Duo Yuan Wei Xie Qing Bao De Ju He Ping Tai ,Wei An Quan Yan Jiu Ren Yuan He Yun Wei Tuan Dui Ti Gong Shi Shi Wei Xie Qing Bao Cha Xun He Bo Bao Fu Wu ;Ji Cheng A Li Yun WAFZhu Dong Lan Jie Wei Xie IP,Diao Yu You Jian Shi Shi Jian Ce ,Ji Cheng AIDeng Duo Xiang Chang Yong An Quan Lei Gong Ju

  • Updated Dec 30, 2025
  • Vue

This is a collection of hacking and pentesting scripts to help with enumeration, OSINT, exploitation and post exploitation automated scripts to make hacking easier. Have fun!

  • Updated Mar 23, 2024
  • Python

Improve this page

Add a description, image, and links to the threat-analysis topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the threat-analysis topic, visit your repo's landing page and select "manage topics."

Learn more