This project aims to bridge the gap between Microsoft Attack Surface Reduction (ASR) rules and MITRE ATT&CK by mapping ASR rules to their corresponding ATT&CK techniques. The primary goal is to enhance the understanding of how ASR rules align with the ATT&CK framework.
☆29Nov 20, 2024Updated last year
Alternatives and similar repositories for Microsoft-ASR-to-MITRE-ATTACK-Mapping-Project
Users that are interested in Microsoft-ASR-to-MITRE-ATTACK-Mapping-Project are comparing it to the libraries listed below
Sorting:
- Advanced Threat Hunting: Ransomware Group☆29Jul 9, 2025Updated 8 months ago
- Sentinel Threat Intelligence Upload Toolkit☆18Jul 15, 2024Updated last year
- ☆37Mar 2, 2026Updated last week
- Sigma Queries turned into KQL for Defender using pysigma☆12Jun 20, 2024Updated last year
- Generates a detailed CSV file containing Sigma Rules statistics for each service or category, and each level, offering a holistic view of…☆10Dec 22, 2023Updated 2 years ago
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆130Apr 6, 2024Updated last year
- Stop Microsoft 365 configuration drift before it becomes a breach☆66Updated this week
- A web API for various cyber threat intelligence frameworks, including MITRE ATT&CK, CWE, ATLAS...☆19Mar 6, 2026Updated last week
- A series of python scripts to extract information from Dark Web Applications☆14Mar 26, 2025Updated 11 months ago
- Config files for my GitHub profile.☆14May 7, 2023Updated 2 years ago
- VTC - Velociraptor Timeline Creator☆19May 15, 2024Updated last year
- Generate a matrix based on an inventory of InfoSec tools☆24Jul 4, 2024Updated last year
- Smarter Asset Search, Faster Information Extraction ZoomEye GPT is a browser extension designed specifically for cybersecurity profession…☆25Apr 30, 2025Updated 10 months ago
- ☆45Apr 10, 2024Updated last year
- ☆18Jun 11, 2024Updated last year
- Merge of two major cyber adversary datasets, MITRE ATT&CK and ETDA/ThaiCERT Threat Actor Cards, enabling victim/motivation-adversary-tech…☆54Jul 31, 2022Updated 3 years ago
- Miscellaneous stuff I create☆65Feb 19, 2026Updated 3 weeks ago
- Cyber Threat Intelligence☆78Dec 7, 2025Updated 3 months ago
- ☆25Jul 12, 2023Updated 2 years ago
- APT hub, It help's research to collect information and data on the latest APT activities. It collects data on APT profiles, IOCs(1 yr), a…☆54Mar 11, 2025Updated last year
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆103Dec 13, 2023Updated 2 years ago
- An automated deployment tool that creates instrumented Azure environments with vulnerable systems for simulating attacks and testing Micr…☆63Jul 27, 2025Updated 7 months ago
- SigmaHQ pySigma CrowdStrike processing pipeline☆28Nov 30, 2025Updated 3 months ago
- Mapping of open-source detection rules and atomic tests.☆204Feb 16, 2026Updated 3 weeks ago
- Exhaustive search and flexible filtering of Active Directory ACEs.☆76Nov 10, 2025Updated 4 months ago
- A collection of companies that disclose adversary TTPs after they have been breached☆289Nov 11, 2025Updated 4 months ago
- ☆59Jul 18, 2024Updated last year
- An improvement and a different approach to Mockingjay Self-Injection.☆35May 21, 2024Updated last year
- ☆30May 1, 2025Updated 10 months ago
- All the principles of the AI modular structure that generates malicious code fragments sold on the dark web☆69Apr 30, 2024Updated last year
- TTPMapper is an AI-driven threat intelligence parser that converts unstructured reports whether from web URLs or PDF files into structure…☆51Jun 21, 2025Updated 8 months ago
- NimReflectiveLoader is a Nim-based tool for in-memory DLL execution using Reflective DLL Loading.☆31Jan 21, 2024Updated 2 years ago
- Google Cloud Security Command Center to Azure Sentinel Connector☆19Jul 15, 2023Updated 2 years ago
- A massive collection of Cybersecurity papers, guides and reports.☆10Jan 3, 2025Updated last year
- ☆29Dec 11, 2025Updated 3 months ago
- Disclaimer: Please note that these materials are public available in several reference websites. These materials are not only the source …☆13Dec 31, 2023Updated 2 years ago
- A collection of PowerShell scripts for analyzing data from Microsoft 365 and Microsoft Entra ID☆577Dec 6, 2025Updated 3 months ago
- Windows Security Logging☆43Jul 17, 2022Updated 3 years ago
- Augmentation to Machine Readable CTI☆37Sep 9, 2025Updated 6 months ago