mitre-atlas / caldera-atlas
☆11Updated last year
Related projects ⓘ
Alternatives and complementary repositories for caldera-atlas
- CALDERA plugin for adversary emulation of AI-enabled systems☆85Updated last year
- source code for the offsecml framework☆35Updated 5 months ago
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆44Updated 3 weeks ago
- An LLM and OCR based Indicator of Compromise Extraction Tool☆31Updated 7 months ago
- ☆99Updated 5 months ago
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆84Updated 10 months ago
- Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogue…☆43Updated last month
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆42Updated last month
- This CALDERA Plugin converts Adversary Emulation Plans from the Center for Threat Informed Defense☆29Updated 9 months ago
- Intel Retrieval Augmented Generation (RAG) Utilities☆88Updated 9 months ago
- A CALDERA plugin☆25Updated 3 months ago
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆75Updated 11 months ago
- All the principles of the AI modular structure that generates malicious code fragments sold on the dark web☆66Updated 6 months ago
- LLM Testing Findings Templates☆65Updated 9 months ago
- Intelligence around common attacker behaviors (MITRE ATT&CK TTPs), in the form of ATT&CK Navigator "layer" json files.☆34Updated 2 years ago
- Cloud Analytics helps defenders detect attacks to their cloud infrastructure by developing behavioral analytics for cloud platforms as we…☆51Updated last year
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆61Updated this week
- A small security playground implementation of GHOSTS User Simulation framework with an Active Directory deployment and Elastic.☆13Updated 4 months ago
- Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. The research…☆26Updated last month
- This project aims to bridge the gap between Microsoft Attack Surface Reduction (ASR) rules and MITRE ATT&CK by mapping ASR rules to their…☆23Updated 2 months ago
- Adversarial Interception Mission Oriented Discovery and Disruption Framework, or AIMOD2, is a structured threat hunting approach to proac…☆85Updated last year
- ForgeArmory provides TTPs that can be used with the TTPForge (https://github.com/facebookincubator/ttpforge).☆93Updated 2 months ago
- A POC to implement Detection-as-Code with Terraform and Sumo Logic.☆25Updated last year
- ☆74Updated this week
- A tool that allows you to document and assess any security automation in your SOC☆41Updated 3 weeks ago
- Sensor Mappings to ATT&CK is a collection of resources to assist cyber defenders with understanding which sensors and events can help det…☆45Updated 5 months ago
- Test case indexes☆37Updated 4 months ago
- Elastic version of SOC prime watcher rules☆28Updated last month
- Automating Security Detection Engineering, published by Packt☆47Updated last month
- Jupyter Univere is a search engine for all infosec jupyter notebooks☆19Updated 4 months ago