COVAIL / MITRE_NIST
A Crowdsourcing Exchange for mapping various sources of security vulnerabilities, exposures, threats, and controls data
☆26Updated 5 years ago
Alternatives and similar repositories for MITRE_NIST:
Users that are interested in MITRE_NIST are comparing it to the libraries listed below
- MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.☆65Updated last year
- A curated threat modeling library collection☆22Updated last year
- Docs: Vulnerability management aggregation of AppSec & OpSec (Tools Listing)☆30Updated 2 years ago
- A tool to assess data quality, built on top of the awesome OSSEM.☆77Updated 2 years ago
- ATT&CK Evaluations website (DEPRECATED)☆59Updated 4 years ago
- Sharing Threat Hunting runbooks☆25Updated 5 years ago
- CARET - A tool for viewing cyber analytic relationships☆26Updated 4 years ago
- Nessus Audit files☆32Updated 2 years ago
- ☆43Updated 2 years ago
- 🚨ATTENTION🚨 The VERIS mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here …☆71Updated last year
- Send your nessus compliance and vulnerability scan data to ElasticSearch☆28Updated 6 years ago
- InfoSec OpenAI Examples☆19Updated last year
- Virtual Security Operations Center☆50Updated last year
- vPrioritizer enables us to understand the contextualized risk (vPRisk) on asset-vulnerability relationship level across the organization,…☆68Updated 3 years ago
- The project was moved here https://github.com/atomic-threat-coverage/atomic-threat-coverage☆24Updated 5 years ago
- SIEM Detection Use Case Library mapped to MITRE ATT&CK tactics and techniques☆12Updated 6 years ago
- OWASP Foundation Web Respository☆31Updated 2 years ago
- Intelligence around common attacker behaviors (MITRE ATT&CK TTPs), in the form of ATT&CK Navigator "layer" json files.☆35Updated 2 years ago
- All-in-one tool for managing vulnerability reports from AppSec pipelines☆106Updated 2 years ago
- The Fastest way to consume Threat Intel☆25Updated 3 years ago
- Project intended to make Attack Maps part of software development by reducing the time it takes to complete them.☆48Updated 8 years ago
- CVE.ICU code.☆42Updated this week
- Attack Range to test detection against nativel serverless cloud services and environments☆35Updated 3 years ago
- Automatically exported from code.google.com/p/nipper-ng☆71Updated 2 years ago
- Collection of resources related to the Center for Threat-Informed Defense☆77Updated 11 months ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- This program generates cyber attack scenarios for use in cyber training exercises, red team planning, blue team planning, automated attac…☆26Updated 4 years ago
- Graph Representation of MITRE ATT&CK's CTI data☆48Updated 5 years ago
- ☆78Updated 4 years ago
- A CALDERA plugin for ATT&CK Evaluations Round 1☆33Updated last year