This project aims to bridge the gap between Microsoft Attack Surface Reduction (ASR) rules and MITRE ATT&CK by mapping ASR rules to their corresponding ATT&CK techniques. The primary goal is to enhance the understanding of how ASR rules align with the ATT&CK framework.
☆29Nov 20, 2024Updated last year
Alternatives and similar repositories for Microsoft-ASR-to-MITRE-ATTACK-Mapping-Project
Users that are interested in Microsoft-ASR-to-MITRE-ATTACK-Mapping-Project are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Advanced Threat Hunting: Ransomware Group☆28Jul 9, 2025Updated 9 months ago
- Sentinel Threat Intelligence Upload Toolkit☆18Jul 15, 2024Updated last year
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆130Apr 6, 2024Updated 2 years ago
- Generates a detailed CSV file containing Sigma Rules statistics for each service or category, and each level, offering a holistic view of…☆10Dec 22, 2023Updated 2 years ago
- Sigma Queries turned into KQL for Defender using pysigma☆12Mar 29, 2026Updated last week
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- ☆37Mar 2, 2026Updated last month
- A series of python scripts to extract information from Dark Web Applications☆14Mar 26, 2025Updated last year
- Generate a matrix based on an inventory of InfoSec tools☆24Jul 4, 2024Updated last year
- Merge of two major cyber adversary datasets, MITRE ATT&CK and ETDA/ThaiCERT Threat Actor Cards, enabling victim/motivation-adversary-tech…☆54Jul 31, 2022Updated 3 years ago
- Config files for my GitHub profile.☆14May 7, 2023Updated 2 years ago
- SigmaHQ pySigma CrowdStrike processing pipeline☆29Nov 30, 2025Updated 4 months ago
- VTC - Velociraptor Timeline Creator☆19May 15, 2024Updated last year
- Miscellaneous stuff I create☆65Updated this week
- Repository for Software Certs for easy software blocking across corp environments, for example, using MDE IOC☆67Mar 31, 2026Updated last week
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A Secure Controls Framework (SCF) Power BI App☆26Nov 3, 2024Updated last year
- Some notes written during my OSCP Journey (KeepNote project)☆11Mar 2, 2020Updated 6 years ago
- An automated deployment tool that creates instrumented Azure environments with vulnerable systems for simulating attacks and testing Micr…☆64Mar 30, 2026Updated last week
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆104Dec 13, 2023Updated 2 years ago
- Exhaustive search and flexible filtering of Active Directory ACEs.☆78Nov 10, 2025Updated 4 months ago
- ☆45Apr 10, 2024Updated last year
- Hints for the Kusto Detective Agency - Season 2☆10Aug 15, 2023Updated 2 years ago
- Detecting and Responding to Threats using Microsoft 365 Defender, published by Packt☆16Jul 10, 2023Updated 2 years ago
- ☆12Oct 29, 2025Updated 5 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Threat Hunting Malware Infrastructure☆11Dec 3, 2023Updated 2 years ago
- TTPMapper is an AI-driven threat intelligence parser that converts unstructured reports whether from web URLs or PDF files into structure…☆52Jun 21, 2025Updated 9 months ago
- ☆44Mar 17, 2026Updated 3 weeks ago
- APT hub, It help's research to collect information and data on the latest APT activities. It collects data on APT profiles, IOCs(1 yr), a…☆54Mar 11, 2025Updated last year
- A collection of companies that disclose adversary TTPs after they have been breached☆289Mar 14, 2026Updated 3 weeks ago
- A web API for various cyber threat intelligence frameworks, including MITRE ATT&CK, CWE, ATLAS...☆19Mar 26, 2026Updated 2 weeks ago
- This project contains a **test executable** specifically designed to trigger incidents in **Microsoft Defender for Endpoint (MDE)**. It…☆14Jul 20, 2025Updated 8 months ago
- "D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system c…☆28Sep 18, 2024Updated last year
- abusing misconfiguration for AD with LAPS☆11Jan 25, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ☆17Feb 25, 2026Updated last month
- Windows Security Logging☆43Jul 17, 2022Updated 3 years ago
- ☆59Jul 18, 2024Updated last year
- MISP to Microsoft Defender integration☆17Feb 24, 2026Updated last month
- Mapping of open-source detection rules and atomic tests.☆204Feb 16, 2026Updated last month
- PowerShell-based Automation of Defender for Endpoint☆191Jul 3, 2025Updated 9 months ago
- 👋 Hi, I’m Nitish Kumar @laymanstake. Working in Windows Infrastructure since almost two decades now. 👀 I’m interested in O365/ Azure/ S…☆12Jan 3, 2025Updated last year