This project aims to bridge the gap between Microsoft Attack Surface Reduction (ASR) rules and MITRE ATT&CK by mapping ASR rules to their corresponding ATT&CK techniques. The primary goal is to enhance the understanding of how ASR rules align with the ATT&CK framework.
☆29Nov 20, 2024Updated last year
Alternatives and similar repositories for Microsoft-ASR-to-MITRE-ATTACK-Mapping-Project
Users that are interested in Microsoft-ASR-to-MITRE-ATTACK-Mapping-Project are comparing it to the libraries listed below
Sorting:
- Advanced Threat Hunting: Ransomware Group☆29Jul 9, 2025Updated 7 months ago
- Sentinel Threat Intelligence Upload Toolkit☆18Jul 15, 2024Updated last year
- Sigma Queries turned into KQL for Defender using pysigma☆12Jun 20, 2024Updated last year
- Generates a detailed CSV file containing Sigma Rules statistics for each service or category, and each level, offering a holistic view of…☆10Dec 22, 2023Updated 2 years ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆128Apr 6, 2024Updated last year
- A web API for various cyber threat intelligence frameworks, including MITRE ATT&CK, CWE, ATLAS...☆19Feb 13, 2026Updated 2 weeks ago
- Config files for my GitHub profile.☆14May 7, 2023Updated 2 years ago
- Smarter Asset Search, Faster Information Extraction ZoomEye GPT is a browser extension designed specifically for cybersecurity profession…☆24Apr 30, 2025Updated 10 months ago
- VTC - Velociraptor Timeline Creator☆19May 15, 2024Updated last year
- Generate a matrix based on an inventory of InfoSec tools☆23Jul 4, 2024Updated last year
- ☆45Apr 10, 2024Updated last year
- ☆18Jun 11, 2024Updated last year
- Cyber Threat Intelligence☆78Dec 7, 2025Updated 2 months ago
- Miscellaneous stuff I create☆65Feb 19, 2026Updated last week
- "D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system c…☆28Sep 18, 2024Updated last year
- APT hub, It help's research to collect information and data on the latest APT activities. It collects data on APT profiles, IOCs(1 yr), a…☆54Mar 11, 2025Updated 11 months ago
- Repository for Software Certs for easy software blocking across corp environments, for example, using MDE IOC☆66Updated this week
- ☆25Jul 12, 2023Updated 2 years ago
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆103Dec 13, 2023Updated 2 years ago
- An automated deployment tool that creates instrumented Azure environments with vulnerable systems for simulating attacks and testing Micr…☆62Jul 27, 2025Updated 7 months ago
- SigmaHQ pySigma CrowdStrike processing pipeline☆27Nov 30, 2025Updated 3 months ago
- Mapping of open-source detection rules and atomic tests.☆202Feb 16, 2026Updated 2 weeks ago
- Exhaustive search and flexible filtering of Active Directory ACEs.☆75Nov 10, 2025Updated 3 months ago
- A collection of companies that disclose adversary TTPs after they have been breached☆289Nov 11, 2025Updated 3 months ago
- ☆59Jul 18, 2024Updated last year
- An improvement and a different approach to Mockingjay Self-Injection.☆35May 21, 2024Updated last year
- ☆30May 1, 2025Updated 10 months ago
- All the principles of the AI modular structure that generates malicious code fragments sold on the dark web☆69Apr 30, 2024Updated last year
- NimReflectiveLoader is a Nim-based tool for in-memory DLL execution using Reflective DLL Loading.☆31Jan 21, 2024Updated 2 years ago
- TTPMapper is an AI-driven threat intelligence parser that converts unstructured reports whether from web URLs or PDF files into structure…☆51Jun 21, 2025Updated 8 months ago
- ☆29Dec 11, 2025Updated 2 months ago
- Google Cloud Security Command Center to Azure Sentinel Connector☆19Jul 15, 2023Updated 2 years ago
- Disclaimer: Please note that these materials are public available in several reference websites. These materials are not only the source …☆13Dec 31, 2023Updated 2 years ago
- A massive collection of Cybersecurity papers, guides and reports.☆10Jan 3, 2025Updated last year
- A collection of PowerShell scripts for analyzing data from Microsoft 365 and Microsoft Entra ID☆577Dec 6, 2025Updated 2 months ago
- Augmentation to Machine Readable CTI☆37Sep 9, 2025Updated 5 months ago
- PowerShell tools to help defenders hunt smarter, hunt harder.☆473Oct 29, 2025Updated 4 months ago
- ☆74Feb 16, 2026Updated 2 weeks ago
- OSSEM Modular☆27Jun 29, 2020Updated 5 years ago