Generate MITRE ATT&CK and D3FEND from a list of CVEs. Database with CVE, CWE, CAPEC, MITRE ATT&CK and D3FEND Techniques data is updated daily. Showcased at BlackHat Europe 2025 Arsenal.
☆283Apr 4, 2026Updated last week
Alternatives and similar repositories for CVE2CAPEC
Users that are interested in CVE2CAPEC are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A tool to generate datasets and models based on vulnerabilities descriptions from @Vulnerability-Lookup.☆25Updated this week
- TIE is a machine learning model for inferring associated MITRE ATT&CK techniques from previously observed techniques.☆69Apr 19, 2025Updated 11 months ago
- SwitchToOpen - The open source shift☆305Nov 21, 2025Updated 4 months ago
- ☆120May 26, 2025Updated 10 months ago
- Interactive simulation of a fictional ransomware group's dashboard☆12Sep 30, 2024Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Derrick is an advanced data leak scanning and CVE vulnerability analysis tool, designed for cybersecurity researchers and digital defense…☆33Mar 6, 2025Updated last year
- ☆44Jan 22, 2026Updated 2 months ago
- Mapping the information system / Cartographie du système d'information☆501Apr 4, 2026Updated last week
- Vulnerability-Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streaml…☆494Updated this week
- ThreatSeeker: Threat Hunting via Windows Event Logs☆123May 16, 2023Updated 2 years ago
- Security Control Knowledge Graph☆32Apr 24, 2024Updated last year
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆151Sep 21, 2024Updated last year
- SMET : Semantic Mapping of CVE to ATT&CK and its Application to Cybersecurity☆52Sep 14, 2024Updated last year
- PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection…☆728Apr 2, 2026Updated last week
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Shellcode loader based on indirect syscall☆22Feb 9, 2025Updated last year
- DFIRLab / Plateforme d'investigation numérique☆15Jul 6, 2021Updated 4 years ago
- Outil de triage automatisé de différents types de collectes d'artefacts.☆18Dec 8, 2025Updated 4 months ago
- CISA CSAF Security Advisories☆101Updated this week
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆117Oct 29, 2024Updated last year
- OOB listener powered by cloudflare workers☆12Apr 13, 2025Updated 11 months ago
- CVEFeed.io: The Ultimate Hub for Vulnerability Insights and Intelligence☆43Mar 3, 2024Updated 2 years ago
- Augmentation to Machine Readable CTI☆39Sep 9, 2025Updated 7 months ago
- Protect your data in minutes !☆125Nov 5, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- An introduction to detection engineering☆14Jan 3, 2025Updated last year
- Mapping of open-source detection rules and atomic tests.☆204Feb 16, 2026Updated last month
- Red Team Operations Framework☆24Jul 14, 2024Updated last year
- AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover se…☆1,514Mar 18, 2026Updated 3 weeks ago
- Map MITRE attack to n dimensional embeddings and vise versa☆18May 22, 2025Updated 10 months ago
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆84May 3, 2024Updated last year
- Information Security Knowledge Graph about NVD CAPEC CWE CPE ..☆67May 12, 2020Updated 5 years ago
- Hardening Active Directory version 2☆382Dec 10, 2025Updated 4 months ago
- Specialized testing tool designed to identify vulnerabilities and bugs in OPC UA (Open Platform Communications Unified Architecture) impl…☆43Feb 4, 2026Updated 2 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ☆74Apr 4, 2026Updated last week
- Sniffing out well-known threat groups☆64Aug 13, 2024Updated last year
- Private Search Set (PSS) is an extension to standard Bloom filter or a standalone hash file to describe and share private set.☆16Jan 10, 2025Updated last year
- Severity scoring and exploit categorisation for vulnerability reports using machine-learning tools.☆26May 16, 2023Updated 2 years ago
- Open Adversarial Exposure Validation Platform☆1,655Updated this week
- MONARC - Method for an Optimised aNAlysis of Risks by @NC3-LU☆118Mar 27, 2026Updated 2 weeks ago
- This repository contains various public projects created by the owners of Hybrid Brothers☆21Nov 3, 2023Updated 2 years ago