Sightings Ecosystem gives cyber defenders visibility into what adversaries actually do in the wild. With your help, we are tracking MITRE ATT&CK® techniques observed to give defenders real data on technique prevalence.
☆38May 28, 2025Updated 10 months ago
Alternatives and similar repositories for sightings_ecosystem
Users that are interested in sightings_ecosystem are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The Measure, Maximize, and Mature Threat-Informed Defense (M3TID) project defines what Threat-Informed Defense (TID) is and the key activ…☆16Jun 25, 2025Updated 9 months ago
- Pathfinder is a plugin for mapping network vulnerabilities, scanned by CALDERA or imported by a supported network scanner, and translatin…☆129Apr 3, 2025Updated last year
- Resources, articles, thoughts, datasets, papers on TI tradecraft☆11Aug 24, 2018Updated 7 years ago
- Attack Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by devel…☆727Nov 14, 2025Updated 5 months ago
- Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. The research…☆57Mar 2, 2026Updated last month
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Apr 10, 2020Updated 6 years ago
- 🚨ATTENTION🚨 The NIST 800-53 mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept…☆496Apr 3, 2024Updated 2 years ago
- 🚨ATTENTION🚨 The VERIS mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here …☆72Apr 3, 2024Updated 2 years ago
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆415Updated this week
- TRAM is an open-source platform designed to advance research into automating the mapping of cyber threat intelligence reports to MITRE AT…☆557May 6, 2025Updated 11 months ago
- Actionable analytics designed to combat threats based on MITRE's ATT&CK.☆23Aug 21, 2019Updated 6 years ago
- Some YARA rules i will add from time to time☆12May 31, 2019Updated 6 years ago
- Top ATT&CK Techniques helps defenders approach the breadth and complexity of MITRE ATT&CK® with a prioritized top 10 list of techniques t…☆123May 28, 2025Updated 10 months ago
- Threat Mapping Catalogue☆18Aug 10, 2021Updated 4 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- 🦈 Prometheus exporter for pcap metrics☆16Feb 15, 2023Updated 3 years ago
- eqgrp-auction decrypted☆13Apr 15, 2017Updated 9 years ago
- Tool to query the RIPE database☆11Jun 2, 2025Updated 10 months ago
- Automating Security Detection Engineering, published by Packt☆67Oct 12, 2024Updated last year
- ☆18Aug 17, 2023Updated 2 years ago
- Cyber Threat Intelligence☆79Dec 7, 2025Updated 4 months ago
- TIE is a machine learning model for inferring associated MITRE ATT&CK techniques from previously observed techniques.☆70Apr 19, 2025Updated last year
- SACTI - Securely aggregate CTI sightings and report them on MISP☆14Oct 24, 2022Updated 3 years ago
- ☆10Mar 31, 2021Updated 5 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A STIX 2.1 Extension Definition for the Course of Action (COA) object type. The nested property extension allows a COA to share machine-r…☆23Dec 11, 2023Updated 2 years ago
- Defending OT with ATT&CK provides a customized threat collection tailored to the attack surface and threat model of operational technolog…☆13May 28, 2025Updated 10 months ago
- DeTT&CT Editor☆12Jan 21, 2026Updated 2 months ago
- Knowledge base workflow management for YARA rules and C2 artifacts (IP, DNS, SSL) (ALPHA STATE AT THE MOMENT)☆103Mar 21, 2026Updated 3 weeks ago
- 整理的一些hw前期准备工作 以及针对攻击者的溯源思路 水平较菜,如有错误或者遗漏的地方还请各位指正 参考资料较多 动态 IP 移动基站 代理池IP(谷歌、百度 是否有处于代理池C段) 国外扫描傀儡机(被标记时间普遍较久、扫描目标众多) 动态域名服务商(如花生壳、公云等) …☆20Apr 3, 2021Updated 5 years ago
- My Blog☆12Feb 4, 2026Updated 2 months ago
- ☆19Oct 30, 2020Updated 5 years ago
- AI agent platform for building multi-agent systems with orchestration, memory, RAG, workflows, and enterprise observability.☆29Oct 27, 2025Updated 5 months ago
- 🐐 Intrusion Detection System☆17Jan 10, 2023Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- HoneyDB Python Module☆14Feb 6, 2024Updated 2 years ago
- RedSage: A Cybersecurity Generalist LLM (ICLR'26)☆39Apr 7, 2026Updated last week
- ADXFlowmaster helps SecOps teams Threat Hunt suspicious network traffic inside & outside of Azure.☆39Oct 30, 2024Updated last year
- Enrich your investigations on IPs, Domains etc. with OSINT☆62Apr 4, 2024Updated 2 years ago
- This CALDERA Plugin converts Adversary Emulation Plans from the Center for Threat Informed Defense☆34Mar 18, 2026Updated last month
- AIL project training materials☆39Feb 24, 2026Updated last month
- Script to create MITRE ATT&CK Navigator layers from the annotated detection rules in Elastic Security (Kibana).☆20Jul 1, 2023Updated 2 years ago