LiuYuancheng / Threats_2_MITRE_AI_MapperView external linksLinks
The objective of this program is to leverage AI-LLM technology to process of human language-based CTI documents to succinctly summarize the attack flow path outlined within such materials via mapping the attack behaviors to the MITRE-ATT&CK and matching the vulnerabilities to MITRE-CWE.
☆69Nov 24, 2025Updated 2 months ago
Alternatives and similar repositories for Threats_2_MITRE_AI_Mapper
Users that are interested in Threats_2_MITRE_AI_Mapper are comparing it to the libraries listed below
Sorting:
- This project is used to create a web server running on the orchestrator to provide a Website interface to control and feed back display f…☆12Dec 30, 2021Updated 4 years ago
- The project main objective is to develop a multiplatform Python program obfuscation tool which can easily safeguard the source code for t…☆14Feb 20, 2025Updated 11 months ago
- We want to create a dashboard (with knowledge graphs) to visualize the network node communication situation based on the firewall logs to…☆16Oct 26, 2024Updated last year
- Welcome to MitreMesh. Where MITRE's framework meets dynamic scenario generation, creating a comprehensive net of incident response tests …☆17Sep 5, 2023Updated 2 years ago
- The primary objective of this project is to develop a cross-platform Python library capable of simulating the core fundamental functional…☆58Jan 19, 2026Updated 3 weeks ago
- We want to create a Python PLC honeypot which support multiple primary OT communication protocols such as Modbus-TCP and Siemens-S7Comm. …☆58Apr 30, 2025Updated 9 months ago
- Advancing TTP Analysis: Harnessing the Power of Large Language Models with Retrieval Augmented Generation☆11May 14, 2024Updated last year
- Ludus role for deploying a Mythic Teamserver onto Linux servers☆23Mar 16, 2025Updated 10 months ago
- AI featured threat modeling and security review project☆17Nov 17, 2024Updated last year
- MALOnt - an ontology for Malware Threat Intelligence.☆13Jul 8, 2021Updated 4 years ago
- The MITRE ATT&CK Mapping Datasets☆17Jan 23, 2024Updated 2 years ago
- ☆14Dec 25, 2023Updated 2 years ago
- Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogue…☆88Jan 28, 2026Updated 2 weeks ago
- AISA-Scanner is an AI-powered autonomous vulnerability scanner that maps CVEs to metasploit exploits, MITRE, CEH, and SANS, delivering in…☆32Jul 31, 2025Updated 6 months ago
- Shock the shell! Exploit many injection method for shellshock☆18Sep 3, 2018Updated 7 years ago
- Liberating dem proprietary APT implants☆20Dec 17, 2019Updated 6 years ago
- A class validation and transformation library, to ensure secure data structures in Python.☆10May 16, 2024Updated last year
- AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE…☆1,207Dec 29, 2025Updated last month
- (Unofficial) Python API for cybercrime-tracker.net☆38Jan 20, 2018Updated 8 years ago
- ☆11Aug 31, 2019Updated 6 years ago
- Short Python script for parsing Defender VDM signature files.☆10Sep 22, 2024Updated last year
- Are WiFi Passwords we use these day's actually safe?☆10Mar 7, 2017Updated 8 years ago
- Wafid allows one to identify and fingerprint Web Application Firewall (WAF) products protecting a website.☆10Oct 19, 2020Updated 5 years ago
- ☆43Jul 9, 2024Updated last year
- ☆22Nov 22, 2025Updated 2 months ago
- A rust crate for parsing, writing and manipulating Android smali files.☆14Jan 14, 2026Updated last month
- RuleVis is a powerful analysis tool that transforms your Wazuh ruleset into a dynamic, interactive force-directed graph. It helps you vis…☆23Nov 12, 2025Updated 3 months ago
- ☆13Apr 9, 2025Updated 10 months ago
- Install AAB is a script that helps with installing an AAB file into a connected Android device☆13Feb 7, 2024Updated 2 years ago
- Secure access cloud terraform provider☆13Updated this week
- ☆10Nov 29, 2025Updated 2 months ago
- Implementing ISO/IEC 27001:2022, by EC-Council☆15Mar 3, 2023Updated 2 years ago
- Import Mitre Att&ck into Neo4j database☆39Dec 8, 2022Updated 3 years ago
- ☆244Dec 22, 2025Updated last month
- Musings from the brainpan.☆10Jan 8, 2019Updated 7 years ago
- Resolve Skype accounts by phone number with API interface☆13Jul 16, 2023Updated 2 years ago
- Pragmatic Network Security for Cloud and Hybrid Networks☆10Nov 24, 2015Updated 10 years ago
- ☆10Jul 6, 2016Updated 9 years ago
- ☆10Mar 31, 2021Updated 4 years ago