COVAIL / MITRE_NIST
A Crowdsourcing Exchange for mapping various sources of security vulnerabilities, exposures, threats, and controls data
☆26Updated 5 years ago
Alternatives and similar repositories for MITRE_NIST:
Users that are interested in MITRE_NIST are comparing it to the libraries listed below
- ATT&CK Evaluations website (DEPRECATED)☆59Updated 3 years ago
- The project was moved here https://github.com/atomic-threat-coverage/atomic-threat-coverage☆24Updated 5 years ago
- Security conferences talks☆25Updated 4 years ago
- A tool to assess data quality, built on top of the awesome OSSEM.☆77Updated 2 years ago
- A curated threat modeling library collection☆22Updated last year
- Joystick is a tool that gives you the ability to transform the ATT&CK Evaluations data into concise views that brings forward the nuances…☆64Updated last year
- Attack Range to test detection against nativel serverless cloud services and environments☆35Updated 3 years ago
- ☆21Updated last year
- Docs: Vulnerability management aggregation of AppSec & OpSec (Tools Listing)☆30Updated last year
- Project intended to make Attack Maps part of software development by reducing the time it takes to complete them.☆48Updated 8 years ago
- Python API for vFeed Vulnerability & Threat Intelligence Database Enterprise & Pro Editions☆100Updated last year
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- Collection of walkthroughs on various threat hunting techniques☆75Updated 4 years ago
- MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.☆63Updated last year
- ☆18Updated 3 years ago
- SIEM Detection Use Case Library mapped to MITRE ATT&CK tactics and techniques☆12Updated 6 years ago
- CARET - A tool for viewing cyber analytic relationships☆26Updated 4 years ago
- Sharing Threat Hunting runbooks☆25Updated 5 years ago
- ☆30Updated 6 years ago
- Compilation of resources to help with Adversary Simulation automation harness☆99Updated 4 years ago
- InfoSec OpenAI Examples☆19Updated last year
- ☆53Updated 6 years ago
- For storing of the volumes☆4Updated 5 years ago
- Mapping your datasources and detections to the MITRE ATT&CK Navigator framework.☆56Updated 4 years ago
- Tool used to perform threat intelligence against packet data☆35Updated 2 months ago
- ☆78Updated 4 years ago
- Bluehat 2018 Graphs for Security Workshop☆42Updated 6 years ago
- ☆44Updated 2 years ago
- Presentation Slides and Video links☆32Updated 3 years ago
- Incident Response Playbooks☆14Updated 5 years ago