center-for-threat-informed-defense / attack-workbench-rest-apiView external linksLinks
An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository contains the REST API service for storing, querying, and editing ATT&CK objects.
☆53Feb 6, 2026Updated last week
Alternatives and similar repositories for attack-workbench-rest-api
Users that are interested in attack-workbench-rest-api are comparing it to the libraries listed below
Sorting:
- [DEPRECATED] An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This r…☆13Aug 16, 2023Updated 2 years ago
- Defending IaaS with ATT&CK is a project to create a collection of ATT&CK techniques relevant to a Linux IaaS environment, as well as a me…☆14May 28, 2025Updated 8 months ago
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆42Jan 20, 2026Updated 3 weeks ago
- ☆11Jan 5, 2021Updated 5 years ago
- 🚨ATTENTION🚨 The NIST 800-53 mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept…☆497Apr 3, 2024Updated last year
- Event forwarder for CrowdStrike Falcon☆11Jan 16, 2024Updated 2 years ago
- STIX data representing MITRE ATT&CK☆530Dec 23, 2025Updated last month
- Powershell Scripts for Blue Team members☆11Dec 1, 2023Updated 2 years ago
- An extension of the sigma standard to include security metrics.☆15May 18, 2023Updated 2 years ago
- ☆20Apr 10, 2025Updated 10 months ago
- Framework to reverse engineer binaries and evaluate similarities across a large collections of files. Uses sector hashing and data flow …☆15May 23, 2023Updated 2 years ago
- This CALDERA Plugin converts Adversary Emulation Plans from the Center for Threat Informed Defense☆34Oct 7, 2025Updated 4 months ago
- How to do recon on a web-application properly☆15Jul 12, 2022Updated 3 years ago
- A native Plugin bringing us out of September 2001, accessing anything you can via a web browser today!☆16Mar 11, 2024Updated last year
- Attack Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by devel…☆713Nov 14, 2025Updated 3 months ago
- Implementation of the OSCAL REST API☆19Feb 23, 2024Updated last year
- ATT&CK Powered Suit is a browser extension that puts the complete MITRE ATT&CK® knowledge base at your fingertips with text search, conte…☆82Jun 9, 2025Updated 8 months ago
- OpenIOC rules to facilitate hunting for indicators of compromise☆37Jan 7, 2022Updated 4 years ago
- ☆20Feb 9, 2024Updated 2 years ago
- Firepit - STIX Columnar Storage☆17Jun 5, 2024Updated last year
- How to set up and install Ss7 and Sigtran Adapt☆31May 19, 2024Updated last year
- TorrentSpyder is a command-line utility designed to retrieve Torrent Download History based on a specified IP address.☆17Oct 19, 2024Updated last year
- ☆15Sep 21, 2019Updated 6 years ago
- The Event Maturity Matrix (EMM) is a comprehensive framework that provides clarity regarding the capabilities and nuances of SaaS audit l…☆30Jun 21, 2025Updated 7 months ago
- 🚨ATTENTION🚨 The Security Stack Mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is k…☆389Apr 3, 2024Updated last year
- Helm chart for Open Cyber Threat Intelligence Platform☆35Updated this week
- This is a malware analyzer for Mac OS X that extends the Cuckoo Sandbox project (https://cuckoosandbox.org/)☆23Jul 8, 2016Updated 9 years ago
- URL / IP / Email defanging with Javascript. Make IoC harmless.☆30Nov 10, 2024Updated last year
- Home for TRANSITS materials☆25Jul 24, 2024Updated last year
- A public repository of MITRE ATT&ACK TTP mappings by BushidoUK for OSINT reports that lack a section breaking down the TTPs.☆27Mar 20, 2025Updated 10 months ago
- OWASP Foundation Web Respository☆32Oct 11, 2025Updated 4 months ago
- An open-source command-line tool for cybersecurity reporting automation and a configuration language for reusable templates. Reporting-as…☆67Jul 6, 2025Updated 7 months ago
- Collects a listing of MITRE ATT&CK Techniques, then discovers Splunk ESCU detections for each technique☆69Mar 17, 2024Updated last year
- TTPDrill focuses on developing automated and context-aware analytics of cyber threat intelligence to accurately learn attack patterns (TT…☆28May 29, 2020Updated 5 years ago
- Public release of Whalehoney Honeypot☆29Mar 21, 2022Updated 3 years ago
- STIX 2.x Java Library☆30Nov 16, 2022Updated 3 years ago
- General Open Architecture Security Questionnaire☆31Jul 25, 2023Updated 2 years ago
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆281Mar 20, 2025Updated 10 months ago
- Security Control Knowledge Graph☆31Apr 24, 2024Updated last year