center-for-threat-informed-defense / mappings-explorerView external linksLinks
Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogued in the MITRE ATT&CK® knowledge base. These mappings form a bridge between the threat-informed approach to cybersecurity and the traditional security controls perspective.
☆89Jan 28, 2026Updated 2 weeks ago
Alternatives and similar repositories for mappings-explorer
Users that are interested in mappings-explorer are comparing it to the libraries listed below
Sorting:
- ATT&CK Sync is a Center for Threat-Informed Defense project that aims to improve the ability for organizations to consume MITRE ATT&CK® v…☆24Dec 5, 2025Updated 2 months ago
- Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. The research…☆55Feb 10, 2026Updated last week
- Attack Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by devel…☆713Nov 14, 2025Updated 3 months ago
- 🚨ATTENTION🚨 The CVE mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here as…☆240Apr 3, 2024Updated last year
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆405Updated this week
- Threat Modeling (based on STRIDE approach) for Kubernetes systems.☆25Oct 14, 2024Updated last year
- Graphs in Cybersecurity - Bloodhound☆19Oct 8, 2024Updated last year
- TRAM is an open-source platform designed to advance research into automating the mapping of cyber threat intelligence reports to MITRE AT…☆545May 6, 2025Updated 9 months ago
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆281Mar 20, 2025Updated 10 months ago
- A Windows PowerShell & PowerShell Core Module to calculate a CVSS3 Score based on a Vector string☆12Dec 20, 2022Updated 3 years ago
- State of vulnerabilties report☆11Feb 20, 2020Updated 5 years ago
- Scripts that I've written that others may find useful☆14Aug 17, 2022Updated 3 years ago
- The Infosec Community Definitive Guide to Jupyter Notebooks☆131Oct 17, 2020Updated 5 years ago
- A python module for working with ATT&CK☆657Feb 1, 2026Updated 2 weeks ago
- Generate MAEC XML from Ero Carrera's pefile output☆15Mar 6, 2017Updated 8 years ago
- Autopsy Module to analyze Registry Hives☆16Feb 18, 2022Updated 4 years ago
- The MITRE ATT&CK Mapping Datasets☆17Jan 23, 2024Updated 2 years ago
- A catalog of services that can be publicly exposed within different cloud providers.☆14Aug 30, 2024Updated last year
- The Measure, Maximize, and Mature Threat-Informed Defense (M3TID) project defines what Threat-Informed Defense (TID) is and the key activ…☆16Jun 25, 2025Updated 7 months ago
- Automatically exported from code.google.com/p/flow-tools☆13Jan 22, 2022Updated 4 years ago
- Notes from my "Implementing a Kick-Butt Training Program: Blue Team GO!" talk☆13Mar 4, 2019Updated 6 years ago
- 🚨ATTENTION🚨 The Security Stack Mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is k…☆388Apr 3, 2024Updated last year
- The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis☆16Sep 13, 2019Updated 6 years ago
- OpenDXL Broker is an open source version of a Data Exchange Layer (DXL) broker☆14Feb 11, 2024Updated 2 years ago
- ATT&CK Powered Suit is a browser extension that puts the complete MITRE ATT&CK® knowledge base at your fingertips with text search, conte…☆82Jun 9, 2025Updated 8 months ago
- Search Engines ADs scanner - spotting malvertising in search engines has never been easier!☆45Nov 10, 2025Updated 3 months ago
- ☆16Jun 21, 2021Updated 4 years ago
- ☆20Jul 16, 2025Updated 7 months ago
- Invictus Threat Intelligence: IOCs and TTPs from blogs, research and more☆30Nov 26, 2025Updated 2 months ago
- Cloud-native SIEM for intelligent security analytics for your entire enterprise.☆20Apr 4, 2023Updated 2 years ago
- Spam Honeypot Tool☆27Jun 1, 2016Updated 9 years ago
- SMET : Semantic Mapping of CVE to ATT&CK and its Application to Cybersecurity☆52Sep 14, 2024Updated last year
- The SEPSES Cyber-KB Engine☆26Nov 27, 2024Updated last year
- A tool for auditing medical devices and healthcare infrastructure☆22Dec 28, 2025Updated last month
- Sensor Mappings to ATT&CK is a collection of resources to assist cyber defenders with understanding which sensors and events can help det…☆50Jun 21, 2025Updated 7 months ago
- ☆31Feb 24, 2014Updated 11 years ago
- CARET - A tool for viewing cyber analytic relationships☆26Aug 21, 2020Updated 5 years ago
- STIX data representing MITRE ATT&CK☆530Dec 23, 2025Updated last month
- ATT&CK Data Model (ADM): A TypeScript library for structured interaction with MITRE ATT&CK datasets. Uses Zod schemas, TypeScript types, …☆66Feb 10, 2026Updated last week