Galeax / CVE2CAPEC
Generate a MITRE ATT&CK Navigator based on a list of CVEs. Database with CVE, CWE, CAPEC, and MITRE ATT&CK Techniques data is updated daily.
☆81Updated this week
Alternatives and similar repositories for CVE2CAPEC:
Users that are interested in CVE2CAPEC are comparing it to the libraries listed below
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆71Updated 2 months ago
- ☆52Updated 2 months ago
- Track C2 servers, tools, and botnets over time by framework and location☆36Updated last month
- A comprehensive knowledge base for security professionals to keep track of and build defenses against API attack techniques.☆42Updated 6 months ago
- Tor onion address lookup☆38Updated last month
- ☆89Updated 2 weeks ago
- Advanced Email Threat Hunting w/ Detection as Code☆52Updated last month
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆119Updated 11 months ago
- ☆74Updated this week
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆146Updated 6 months ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆61Updated last year
- This repository contains a comprehensive testing designed for evaluating the performance and resilience of Endpoint Detection and Respons…☆51Updated 5 months ago
- Mapping of open-source detection rules and atomic tests.☆158Updated 2 months ago
- ☆55Updated 10 months ago
- Raw data from Threat Intelligence Reports with automatic reports collection and keyword search across thousands of reports☆101Updated this week
- A collection of CVEs weaponized by ransomware operators☆111Updated last week
- This tool parses Windows EVTX logs to extract login and logout sessions from a security.evtx file. It uses a Tkinter GUI to let you selec…☆31Updated last month
- An open-source self-hosted purple team management web application.☆264Updated this week
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆192Updated 2 months ago
- Framework for Monitoring File Ingestion Source for Yara Matches☆45Updated 2 weeks ago
- Completely Risky Active-Directory Simulation Hub☆99Updated last year
- An offline Phishing Email Analyzer. Enabling non-techies to analyze phishing emails automatically!☆61Updated last year
- MSSprinkler is a password spraying utility for organizations to test their Microsoft Online accounts from an external perspective. It emp…☆74Updated last month
- Welcome to Project KillChain, a comprehensive GitHub repository for Red and Blue Teams. This repository houses tools, scripts, technique…☆101Updated 7 months ago
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆85Updated 4 months ago
- This is an AD pentest tools collection☆57Updated 8 months ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆147Updated last month
- Find CVEs associated to Linux and public exploits on github☆117Updated last year
- Online resources related to Detection Engineering. Detection rules, detection logic, attack samples, detection tests and emulation tools…☆76Updated this week
- ThreatSeeker: Threat Hunting via Windows Event Logs☆120Updated last year