an excel-centric approach for the MITRE ATT&CK® Tactics and Techniques
☆187May 5, 2022Updated 3 years ago
Alternatives and similar repositories for attack-coverage
Users that are interested in attack-coverage are comparing it to the libraries listed below
Sorting:
- OSSEM Modular☆27Jun 29, 2020Updated 5 years ago
- The Enhanced MITRE ATT&CK® Coverage Tracker is an Excel tool for SOCs to measure and improve detection coverage of cyber threats. It simp…☆34Nov 13, 2025Updated 3 months ago
- Resources for SANS CTI Summit 2021 presentation☆104Nov 8, 2023Updated 2 years ago
- S2AN - Mapper of Sigma/Suricata Rules/Signatures ➡️ MITRE ATT&CK Navigator☆91Dec 8, 2022Updated 3 years ago
- A repository of curated datasets from various attacks☆726Updated this week
- Misc Threat Hunting Resources☆377Jan 26, 2023Updated 3 years ago
- Windows Events Attack Samples☆2,515Jan 24, 2023Updated 3 years ago
- Python library to query various sources of threat intelligence for data on domains, file hashes, and IP addresses.☆31Nov 6, 2023Updated 2 years ago
- DeTT&CT Editor☆12Jan 21, 2026Updated last month
- Building environments to replicate small networks and deploy applications☆330Jan 9, 2026Updated last month
- Notes on responding to security breaches relating to Azure AD☆121Mar 14, 2022Updated 3 years ago
- Signature engine for all your logs☆172Nov 13, 2023Updated 2 years ago
- A query aggregator for OSINT based threat hunting☆930Jan 23, 2026Updated last month
- #ThreatHunting #DFIR #Malware #Detection Mind Maps☆304Nov 13, 2021Updated 4 years ago
- MAL-CL (Malicious Command-Line)☆322Jan 10, 2023Updated 3 years ago
- Collection of tools that reflect the network dimension into Bloodhound's data☆446Oct 19, 2022Updated 3 years ago
- Detect Tactics, Techniques & Combat Threats☆2,263Jan 21, 2026Updated last month
- A knowledge base of actionable Incident Response techniques☆662May 31, 2022Updated 3 years ago
- Blueteam operational triage registry hunting/forensic tool.☆149Sep 2, 2025Updated 5 months ago
- Repository resource threat intelligence for SOC☆10Sep 14, 2018Updated 7 years ago
- ☆28Mar 29, 2022Updated 3 years ago
- Automated detection rule analysis utility☆28Sep 22, 2022Updated 3 years ago
- Threat Box Assessment Tool☆19Aug 15, 2021Updated 4 years ago
- An easy to use PowerShell script to collect memory and disk forensics for DFIR investigations.☆341Dec 3, 2025Updated 2 months ago
- A datasource assessment on an event level to show potential coverage or the MITRE ATT&CK framework☆355Nov 3, 2020Updated 5 years ago
- Sysmon EDR POC Build within Powershell to prove ability.☆223May 1, 2021Updated 4 years ago
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆60Mar 12, 2022Updated 3 years ago
- See adversary, do adversary: Simple execution of commands for defensive tuning/research (now with more ELF on the shelf)☆108Feb 12, 2023Updated 3 years ago
- DFIRTrack - The Incident Response Tracking Application☆532Jan 13, 2026Updated last month
- Collection of scripts used to analyse malware or emails☆20Oct 6, 2020Updated 5 years ago
- A curated list of KAPE-related resources☆182May 1, 2025Updated 10 months ago
- Tools to rapidly deploy a threat hunting capability on Azure Sentinel that leverages Sysmon and MITRE ATT&CK☆1,078Nov 28, 2024Updated last year
- A repository of DFIR-related Mind Maps geared towards the visual learners!☆549Sep 2, 2022Updated 3 years ago
- ☆349Mar 19, 2021Updated 4 years ago
- Detect possible sysmon logging bypasses given a specific configuration☆111Dec 26, 2018Updated 7 years ago
- Test Blue Team detections without running any attack.☆271May 2, 2024Updated last year
- A standalone SIGMA-based detection tool for EVTX, Auditd and Sysmon for Linux logs☆785Updated this week
- Bash script to extract data from an Android device☆278Oct 28, 2022Updated 3 years ago
- Repository for threat hunting and detection queries, etc. for Defender for Endpoint and Microsoft Sentinel in KQL(Kusto Query Language).☆804Jan 14, 2026Updated last month