center-for-threat-informed-defense / sensor-mappings-to-attackView external linksLinks
Sensor Mappings to ATT&CK is a collection of resources to assist cyber defenders with understanding which sensors and events can help detect real-world adversary behaviors in their environments.
☆50Jun 21, 2025Updated 7 months ago
Alternatives and similar repositories for sensor-mappings-to-attack
Users that are interested in sensor-mappings-to-attack are comparing it to the libraries listed below
Sorting:
- Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. The research…☆55Feb 10, 2026Updated last week
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆53Feb 6, 2026Updated last week
- VTC - Velociraptor Timeline Creator☆19May 15, 2024Updated last year
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆405Updated this week
- Generates a detailed CSV file containing Sigma Rules statistics for each service or category, and each level, offering a holistic view of…☆10Dec 22, 2023Updated 2 years ago
- A simple utility to generate real File and Active Directory activity in lab environments for the purposes of monitoring changes and detec…☆11Dec 4, 2018Updated 7 years ago
- This is the Network Flow Generator for ICSSIM☆16Aug 28, 2025Updated 5 months ago
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆281Mar 20, 2025Updated 10 months ago
- ☆12Aug 8, 2022Updated 3 years ago
- Learn how to get more out of publicly available threat reports to help improve the security posture of your organization! TLP: White Thre…☆15Jun 5, 2023Updated 2 years ago
- 🚨ATTENTION🚨 The NIST 800-53 mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept…☆497Apr 3, 2024Updated last year
- Attack Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by devel…☆713Nov 14, 2025Updated 3 months ago
- CarbonBlack EDR detection rules and response actions☆73Sep 10, 2024Updated last year
- ATT&CK Sync is a Center for Threat-Informed Defense project that aims to improve the ability for organizations to consume MITRE ATT&CK® v…☆24Dec 5, 2025Updated 2 months ago
- A collection of tools, scripts and personal research☆155Feb 2, 2026Updated 2 weeks ago
- Convert a variety of log formats to CSV while enriching detected IPs with Geolocation, ASN, DNS, WhoIs, Shodan InternetDB and Threat Indi…☆110Feb 6, 2026Updated last week
- TRAM is an open-source platform designed to advance research into automating the mapping of cyber threat intelligence reports to MITRE AT…☆545May 6, 2025Updated 9 months ago
- Rules generated from our investigations.☆204Jun 17, 2025Updated 8 months ago
- Smarter Asset Search, Faster Information Extraction ZoomEye GPT is a browser extension designed specifically for cybersecurity profession…☆24Apr 30, 2025Updated 9 months ago
- ☆17Jul 20, 2024Updated last year
- Risk measurement and management framework☆18Jun 20, 2025Updated 7 months ago
- Sightings Ecosystem gives cyber defenders visibility into what adversaries actually do in the wild. With your help, we are tracking MITRE…☆38May 28, 2025Updated 8 months ago
- ☆40Feb 23, 2023Updated 2 years ago
- An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and secur…☆172Feb 8, 2026Updated last week
- This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.☆114Nov 19, 2024Updated last year
- Actionable analytics designed to combat threats☆1,006May 25, 2022Updated 3 years ago
- MITRE Shield website☆19Oct 20, 2021Updated 4 years ago
- Detect Tactics, Techniques & Combat Threats☆2,263Jan 21, 2026Updated 3 weeks ago
- The ICS Advisory Project is an open-source project to provide CISA ICS Advisories data in Comma Separated Value (CSV) format to support v…☆91Updated this week
- A web application that assists network defenders, analysts, and researchers in the process of mapping adversary behaviors to the MITRE AT…☆1,207Feb 3, 2026Updated 2 weeks ago
- Threat Modeling (based on STRIDE approach) for Kubernetes systems.☆25Oct 14, 2024Updated last year
- A tool that allows you to document and assess any security automation in your SOC☆49Oct 31, 2024Updated last year
- IBM RedCON 2020 - Throwing an AquaWrench into the Kernel☆44Aug 25, 2020Updated 5 years ago
- A collaborative CISSP notes card☆39Dec 20, 2015Updated 10 years ago
- This repository services the UNO Cybersecurity capstone (CYBR 4580/8950)☆11Jan 26, 2026Updated 3 weeks ago
- ☆19Oct 30, 2020Updated 5 years ago
- Sigma detection rules for hunting with the threathunting-keywords project☆58Mar 2, 2025Updated 11 months ago
- Go module that allows you to authenticate to Azure with a well known client ID using interactive logon and grab the token☆26Dec 1, 2022Updated 3 years ago
- 🚨ATTENTION🚨 The Security Stack Mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is k…☆389Apr 3, 2024Updated last year