Generate MITRE ATT&CK and D3FEND from a list of CVEs. Database with CVE, CWE, CAPEC, MITRE ATT&CK and D3FEND Techniques data is updated daily. Showcased at BlackHat Europe 2025 Arsenal.
☆271Updated this week
Alternatives and similar repositories for CVE2CAPEC
Users that are interested in CVE2CAPEC are comparing it to the libraries listed below
Sorting:
- A tool to generate datasets and models based on vulnerabilities descriptions from @Vulnerability-Lookup.☆23Feb 19, 2026Updated last week
- Home of https://redteam.guide☆15Sep 19, 2022Updated 3 years ago
- SwitchToOpen - The open source shift☆305Nov 21, 2025Updated 3 months ago
- Interactive simulation of a fictional ransomware group's dashboard☆12Sep 30, 2024Updated last year
- TIE is a machine learning model for inferring associated MITRE ATT&CK techniques from previously observed techniques.☆66Apr 19, 2025Updated 10 months ago
- ☆120May 26, 2025Updated 9 months ago
- Vulnerability-Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streaml…☆471Updated this week
- The CRATOS proxy API integrates with your MISP instance and allows to extract indicators that can be consumed by security components such…☆13Sep 21, 2025Updated 5 months ago
- MacInjector is a tool that lists macOS applications, checks code-signing vulnerabilities, and injects a dynamic library (dylib) into a vu…☆17Oct 8, 2025Updated 4 months ago
- A package to create HTML MISP reports, including volume of trending events and attributes, evens received from key organisations and targ…☆11Aug 14, 2025Updated 6 months ago
- ☆44Jan 22, 2026Updated last month
- Private Search Set (PSS) is an extension to standard Bloom filter or a standalone hash file to describe and share private set.☆16Jan 10, 2025Updated last year
- Golang implementation of PyMISP-feedgenerator☆18Jul 31, 2022Updated 3 years ago
- SMET : Semantic Mapping of CVE to ATT&CK and its Application to Cybersecurity☆52Sep 14, 2024Updated last year
- Security Control Knowledge Graph☆31Apr 24, 2024Updated last year
- ThreatSeeker: Threat Hunting via Windows Event Logs☆124May 16, 2023Updated 2 years ago
- TTPMapper is an AI-driven threat intelligence parser that converts unstructured reports whether from web URLs or PDF files into structure…☆51Jun 21, 2025Updated 8 months ago
- Mapping the information system / Cartographie du système d'information☆493Updated this week
- The backend server handling API requests and task management☆55Updated this week
- 🔍 LFIer is a powerful and efficient tool for detecting Local File Inclusion (LFI) vulnerabilities in web applications.☆55Dec 23, 2024Updated last year
- Scripts to deploy and update MISP in air-gapped environments☆17Jan 20, 2026Updated last month
- ☆74Feb 16, 2026Updated 2 weeks ago
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆34Oct 21, 2025Updated 4 months ago
- Hardening Active Directory version 2☆377Dec 10, 2025Updated 2 months ago
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆116Oct 29, 2024Updated last year
- Tool to guess CPE name based on common software name☆117Feb 11, 2026Updated 2 weeks ago
- An ongoing curated collection of awesome software, libraries, frameworks, talks & videos, best practices, learning tutorials and importan…☆21Jul 29, 2022Updated 3 years ago
- Shellcode loader based on indirect syscall☆22Feb 9, 2025Updated last year
- HASH (HTTP Agnostic Software Honeypot)☆141Feb 13, 2026Updated 2 weeks ago
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆42Jan 20, 2026Updated last month
- Azure AD (Entra ID) enumeration tool. Find related domains and tenant information in a simple way.☆35Oct 4, 2024Updated last year
- AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover se…☆1,475Jan 23, 2026Updated last month
- Incident Notification Platform by @NC3-LU☆11Updated this week
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆150Sep 21, 2024Updated last year
- Subdomain Takeover lab is FREE for everyone. This means here is a legal to takeover Subdomain of this website. Here you'll find more tha…☆24Jan 1, 2025Updated last year
- MONARC - Method for an Optimised aNAlysis of Risks by @NC3-LU☆119Feb 23, 2026Updated last week
- Red Team Operations Framework☆24Jul 14, 2024Updated last year
- This repository contains detailed adversary simulation APT campaigns targeting various critical sectors. Each simulation includes custom …☆1,047Feb 16, 2026Updated 2 weeks ago
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆216Updated this week