center-for-threat-informed-defense / m3tidView external linksLinks
The Measure, Maximize, and Mature Threat-Informed Defense (M3TID) project defines what Threat-Informed Defense (TID) is and the key activities associated with its practice.
☆16Jun 25, 2025Updated 7 months ago
Alternatives and similar repositories for m3tid
Users that are interested in m3tid are comparing it to the libraries listed below
Sorting:
- Sightings Ecosystem gives cyber defenders visibility into what adversaries actually do in the wild. With your help, we are tracking MITRE…☆38May 28, 2025Updated 8 months ago
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆83May 3, 2024Updated last year
- Cyber Threat Intelligence☆74Dec 7, 2025Updated 2 months ago
- Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. The research…☆55Feb 10, 2026Updated last week
- The Enhanced MITRE ATT&CK® Coverage Tracker is an Excel tool for SOCs to measure and improve detection coverage of cyber threats. It simp…☆34Nov 13, 2025Updated 3 months ago
- ☆11Mar 25, 2024Updated last year
- ☆36Nov 9, 2025Updated 3 months ago
- Sigma Queries turned into KQL for Defender using pysigma☆12Jun 20, 2024Updated last year
- Cybersecurity Ontology (CyberOnto) and Situational Awareness (CyberSA) help teamwork in Cyber Incident Responses, Control, Containment, a…☆10Sep 15, 2022Updated 3 years ago
- Microsoft-Defender-for-IoT☆14May 26, 2025Updated 8 months ago
- An SSH honeypot written entirely in Go.☆12Dec 4, 2025Updated 2 months ago
- ☆43Jan 29, 2023Updated 3 years ago
- ☆11Dec 7, 2025Updated 2 months ago
- ☆11Feb 11, 2024Updated 2 years ago
- A GPT-based chatbot who knows the content of your Confluence wiki.☆14Apr 22, 2025Updated 9 months ago
- Arch Linux dotfiles☆10Oct 31, 2024Updated last year
- A cookiecutter template for creating MCP (Model Control Protocol) servers☆20Feb 8, 2026Updated last week
- ☆10Mar 31, 2021Updated 4 years ago
- This module helps you get started with basic Zigbee analysis, and later on performing additional attacks on the Zigbee protocol.☆12Nov 23, 2016Updated 9 years ago
- Repair docker-smell automatically☆13May 15, 2024Updated last year
- Simple Docker definition to serve mocked APIs from static JSON files.☆11Apr 27, 2018Updated 7 years ago
- Create CycloneDX Software Bill of Materials (SBOM) for Buildroot projects☆14Dec 9, 2025Updated 2 months ago
- Script for downloading Burp Suite extension files☆11Jan 29, 2024Updated 2 years ago
- Adaptive Machine Learning-Based Stock Prediction using Financial Time Series Technical Indicators☆10Dec 21, 2019Updated 6 years ago
- Prompts for ChatGPT 4 useful for developers, cybersecurity professionals, hackers and IT workers☆13Mar 20, 2023Updated 2 years ago
- Docker + CVE-2015-2925 = escaping from --volume☆11Jun 30, 2015Updated 10 years ago
- ☆15Feb 21, 2023Updated 2 years ago
- ☆13Feb 18, 2024Updated last year
- TIE is a machine learning model for inferring associated MITRE ATT&CK techniques from previously observed techniques.☆65Apr 19, 2025Updated 9 months ago
- Prevent cloud misconfigurations during build-time for Terraform, Cloudformation, Kubernetes, Serverless framework, and other infrastructu…☆11Jan 13, 2026Updated last month
- This search engine automates the discovery of sensitive information using customized dorks across GitHub, Google, and Shodan.☆15Oct 16, 2024Updated last year
- Docker configuration for running Pi-Hole and Cloudflared on a Raspberry Pi for ultimate network DNS filtering and security☆11Jul 17, 2021Updated 4 years ago
- The tutorial of "Kubernetes Security for Microservices"☆14Oct 3, 2023Updated 2 years ago
- Parameter-Reflect-Finder is a python based tool that helps you find reflected parameters which can have potential XSS or Open redirection…☆16Aug 8, 2022Updated 3 years ago
- Cookiecutter template for building consistent Terraform modules.☆12Nov 5, 2015Updated 10 years ago
- Summarize CTI reports with OpenAI☆18Feb 9, 2026Updated last week
- ☆12Aug 21, 2020Updated 5 years ago
- CTF designed for Middle School-aged kids☆12Oct 18, 2024Updated last year
- The repository contains IOCs in CSV format for APT, Cyber Crimes, Malware and Trojan and whatever I found as part of hunting and research☆12Jun 10, 2017Updated 8 years ago