mitre-atlas / atlas-data
ATLAS tactics, techniques, and case studies data
☆54Updated 3 months ago
Alternatives and similar repositories for atlas-data:
Users that are interested in atlas-data are comparing it to the libraries listed below
- CALDERA plugin for adversary emulation of AI-enabled systems☆87Updated last year
- Explore AI Supply Chain Risk with the AI Risk Database☆51Updated 8 months ago
- Secure Jupyter Notebooks and Experimentation Environment☆64Updated this week
- Code for shelLM tool☆48Updated 2 months ago
- ☆100Updated 7 months ago
- OASIS Cyber Threat Intelligence (CTI) TC: A tool for generating STIX content for prototyping and testing. https://github.com/oasis-open/c…☆40Updated 9 months ago
- ☆33Updated last month
- TIE is a machine learning model for inferring associated MITRE ATT&CK techniques from previously observed techniques.☆34Updated 2 months ago
- using ML models for red teaming☆39Updated last year
- A collection of agents that use Large Language Models (LLMs) to perform tasks common on our day to day jobs in cyber security.☆78Updated 8 months ago
- ☆34Updated 2 weeks ago
- source code for the offsecml framework☆37Updated 7 months ago
- Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogue…☆48Updated this week
- The project serves as a strategic advisory tool, capitalizing on the ZySec series of AI models to amplify the capabilities of security pr…☆43Updated 7 months ago
- Risks and targets for assessing LLMs & LLM vulnerabilities☆30Updated 7 months ago
- "Linking Threat Tactics, Techniques, and Patterns with Defensive Weaknesses, Vulnerabilities and Affected Platform Configurations for Cyb…☆92Updated 6 months ago
- Data Scientists Go To Jupyter☆62Updated last month
- Augmentation to Machine Readable CTI☆27Updated last month
- Intelligence around common attacker behaviors (MITRE ATT&CK TTPs), in the form of ATT&CK Navigator "layer" json files.☆34Updated 2 years ago
- Security Control Knowledge Graph☆26Updated 8 months ago
- ☆11Updated last year
- Test Software for the Characterization of AI Technologies☆235Updated this week
- Open Source Tool - Cybersecurity Graph Database in Neo4j☆58Updated last year
- A benchmark for prompt injection detection systems.☆94Updated 4 months ago
- Adversary Emulation Planner☆38Updated 6 months ago
- Sensor Mappings to ATT&CK is a collection of resources to assist cyber defenders with understanding which sensors and events can help det…☆49Updated 7 months ago
- ☆86Updated 4 months ago
- STIX 2.1 Visualizer, Attack and Activity Thread Graph for Threat Modeling☆34Updated last month
- Extracts IoCs, TTPs and the relationships between them. Outputs a STIX 2.1 bundle.☆28Updated last week
- ☆209Updated this week