This project aims to bridge the gap between Microsoft Attack Surface Reduction (ASR) rules and MITRE ATT&CK by mapping ASR rules to their corresponding ATT&CK techniques. The primary goal is to enhance the understanding of how ASR rules align with the ATT&CK framework.
☆29Nov 20, 2024Updated last year
Alternatives and similar repositories for Microsoft-ASR-to-MITRE-ATTACK-Mapping-Project
Users that are interested in Microsoft-ASR-to-MITRE-ATTACK-Mapping-Project are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Advanced Threat Hunting: Ransomware Group☆28Jul 9, 2025Updated 10 months ago
- Sentinel Threat Intelligence Upload Toolkit☆18Jul 15, 2024Updated last year
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆130Apr 6, 2024Updated 2 years ago
- Generates a detailed CSV file containing Sigma Rules statistics for each service or category, and each level, offering a holistic view of…☆10Dec 22, 2023Updated 2 years ago
- Sigma Queries turned into KQL for Defender using pysigma☆12Mar 29, 2026Updated last month
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆38Mar 2, 2026Updated 2 months ago
- A series of python scripts to extract information from Dark Web Applications☆14Mar 26, 2025Updated last year
- Generate a matrix based on an inventory of InfoSec tools☆24Jul 4, 2024Updated last year
- Merge of two major cyber adversary datasets, MITRE ATT&CK and ETDA/ThaiCERT Threat Actor Cards, enabling victim/motivation-adversary-tech…☆55Jul 31, 2022Updated 3 years ago
- Config files for my GitHub profile.☆14May 7, 2023Updated 3 years ago
- SigmaHQ pySigma CrowdStrike processing pipeline☆29Nov 30, 2025Updated 5 months ago
- VTC - Velociraptor Timeline Creator☆19May 15, 2024Updated 2 years ago
- Repository for Software Certs for easy software blocking across corp environments, for example, using MDE IOC☆70May 8, 2026Updated last week
- Miscellaneous stuff I create☆71Apr 21, 2026Updated 3 weeks ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A Secure Controls Framework (SCF) Power BI App☆26Nov 3, 2024Updated last year
- An automated deployment tool that creates instrumented Azure environments with vulnerable systems for simulating attacks and testing Micr…☆65Mar 30, 2026Updated last month
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆104Dec 13, 2023Updated 2 years ago
- Exhaustive search and flexible filtering of Active Directory ACEs.☆78Nov 10, 2025Updated 6 months ago
- ☆45Apr 10, 2024Updated 2 years ago
- Hints for the Kusto Detective Agency - Season 2☆10Aug 15, 2023Updated 2 years ago
- Detecting and Responding to Threats using Microsoft 365 Defender, published by Packt☆16Jul 10, 2023Updated 2 years ago
- ☆18Feb 25, 2026Updated 2 months ago
- Smarter Asset Search, Faster Information Extraction ZoomEye GPT is a browser extension designed specifically for cybersecurity profession…☆26Apr 30, 2025Updated last year
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- ☆12Oct 29, 2025Updated 6 months ago
- TTPMapper is an AI-driven threat intelligence parser that converts unstructured reports whether from web URLs or PDF files into structure…☆53Jun 21, 2025Updated 10 months ago
- ☆46Apr 6, 2026Updated last month
- APT hub, It help's research to collect information and data on the latest APT activities. It collects data on APT profiles, IOCs(1 yr), a…☆55Mar 11, 2025Updated last year
- A collection of companies that disclose adversary TTPs after they have been breached☆300May 11, 2026Updated last week
- This project contains a **test executable** specifically designed to trigger incidents in **Microsoft Defender for Endpoint (MDE)**. It…☆14Jul 20, 2025Updated 9 months ago
- "D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system c…☆28Sep 18, 2024Updated last year
- abusing misconfiguration for AD with LAPS☆11Jan 25, 2024Updated 2 years ago
- Windows Security Logging☆43Jul 17, 2022Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆60Jul 18, 2024Updated last year
- ☆18Jul 13, 2022Updated 3 years ago
- PowerShell-based Automation of Defender for Endpoint☆193Jul 3, 2025Updated 10 months ago
- Mapping of open-source detection rules and atomic tests.☆211Feb 16, 2026Updated 3 months ago
- 👋 Hi, I’m Nitish Kumar @laymanstake. Working in Windows Infrastructure since almost two decades now. 👀 I’m interested in O365/ Azure/ S …☆12Jan 3, 2025Updated last year
- Automating Cyber Threat Intelligence Reporting with Natural Language Generation☆15Jan 24, 2024Updated 2 years ago
- ☆43May 22, 2021Updated 4 years ago