The objective of this program is to leverage AI-LLM technology to process of human language-based CTI documents to succinctly summarize the attack flow path outlined within such materials via mapping the attack behaviors to the MITRE-ATT&CK and matching the vulnerabilities to MITRE-CWE.
☆69Nov 24, 2025Updated 3 months ago
Alternatives and similar repositories for Threats_2_MITRE_AI_Mapper
Users that are interested in Threats_2_MITRE_AI_Mapper are comparing it to the libraries listed below
Sorting:
- Welcome to MitreMesh. Where MITRE's framework meets dynamic scenario generation, creating a comprehensive net of incident response tests …☆17Sep 5, 2023Updated 2 years ago
- Advancing TTP Analysis: Harnessing the Power of Large Language Models with Retrieval Augmented Generation☆11May 14, 2024Updated last year
- MALOnt - an ontology for Malware Threat Intelligence.☆13Jul 8, 2021Updated 4 years ago
- Ludus role for deploying a Mythic Teamserver onto Linux servers☆23Mar 16, 2025Updated 11 months ago
- Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogue…☆90Mar 2, 2026Updated last week
- AISA-Scanner is an AI-powered autonomous vulnerability scanner that maps CVEs to metasploit exploits, MITRE, CEH, and SANS, delivering in…☆32Jul 31, 2025Updated 7 months ago
- Shock the shell! Exploit many injection method for shellshock☆18Sep 3, 2018Updated 7 years ago
- Replication package for the paper "Automatic Mapping of Unstructured Cyber Threat Intelligence: An Experimental Study" published at the I…☆58Aug 29, 2022Updated 3 years ago
- Liberating dem proprietary APT implants☆20Dec 17, 2019Updated 6 years ago
- A class validation and transformation library, to ensure secure data structures in Python.☆10May 16, 2024Updated last year
- AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE…☆1,206Dec 29, 2025Updated 2 months ago
- (Unofficial) Python API for cybercrime-tracker.net☆38Jan 20, 2018Updated 8 years ago
- SelF eXtract Maker for windows. (WinSFXMaker is a very super simple install-sheild GUI tool for creating self-extracting (SFX) executable…☆51Feb 21, 2026Updated 2 weeks ago
- ☆11Aug 31, 2019Updated 6 years ago
- Python's dependable dependency injection container for managing lifecycles and registrations.☆14May 16, 2024Updated last year
- User anomaly detector based on logs generated by Osquery framework and machine learning to process those logs.☆33Jul 10, 2017Updated 8 years ago
- Install AAB is a script that helps with installing an AAB file into a connected Android device☆13Feb 7, 2024Updated 2 years ago
- Import Mitre Att&ck into Neo4j database☆39Dec 8, 2022Updated 3 years ago
- Short Python script for parsing Defender VDM signature files.☆10Sep 22, 2024Updated last year
- Implementing ISO/IEC 27001:2022, by EC-Council☆16Feb 20, 2026Updated 2 weeks ago
- ☆13Apr 9, 2025Updated 10 months ago
- Are WiFi Passwords we use these day's actually safe?☆10Mar 7, 2017Updated 9 years ago
- ☆12Nov 16, 2020Updated 5 years ago
- ☆22Nov 22, 2025Updated 3 months ago
- RuleVis is a powerful analysis tool that transforms your Wazuh ruleset into a dynamic, interactive force-directed graph. It helps you vis…☆24Nov 12, 2025Updated 3 months ago
- Secure access cloud terraform provider☆13Updated this week
- Wafid allows one to identify and fingerprint Web Application Firewall (WAF) products protecting a website.☆10Oct 19, 2020Updated 5 years ago
- A repository for managing the complete lifecycle of large language model (LLM) development. This toolkit integrates open-source framework…☆12Jan 8, 2025Updated last year
- Shows command lines used by latest instances analyzed on Hybrid-Analysis☆43Sep 18, 2018Updated 7 years ago
- A rust crate for parsing, writing and manipulating Android smali files.☆17Jan 14, 2026Updated last month
- ☆16Aug 25, 2025Updated 6 months ago
- A collection of short scripts for analysis, encryption and forensics, that can be used for CTF and/or security assessments☆10Sep 22, 2015Updated 10 years ago
- 基于bind9做了二次封装,将所有数据存在数据库,用jinja2加配置模板来自动生成bind所需的配置文件。并监控各个配置文件,有变化就自动reload named服务。☆11Dec 20, 2018Updated 7 years ago
- An Ansible Role that installs ADCS on Windows Server and optionally configures Certified Preowned templates.☆17Jan 22, 2026Updated last month
- Simply runs through a wordlist of default/common group IDs and parses each hash to a separate file. Then it runs through the hashes with …☆10Feb 15, 2017Updated 9 years ago
- ☆11Jan 5, 2022Updated 4 years ago
- Kibana Plugin to Associate custom CSS to Dashboards☆11May 11, 2021Updated 4 years ago
- ☆12Dec 26, 2022Updated 3 years ago
- Ios 11-11.1.2 Jailbreak And ios 10-10.3.3 jailbreak. ORIGINAL PROJECT: https://github.com/JosephShenton/C0F3☆13Feb 8, 2018Updated 8 years ago