mitre-atlas / caldera-atlas
☆11Updated last year
Alternatives and similar repositories for caldera-atlas:
Users that are interested in caldera-atlas are comparing it to the libraries listed below
- CALDERA plugin for adversary emulation of AI-enabled systems☆90Updated last year
- ☆36Updated 2 months ago
- source code for the offsecml framework☆37Updated 8 months ago
- ☆36Updated last month
- A CALDERA plugin☆25Updated 6 months ago
- Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogue…☆53Updated last week
- ATLAS tactics, techniques, and case studies data☆56Updated 4 months ago
- This CALDERA Plugin converts Adversary Emulation Plans from the Center for Threat Informed Defense☆30Updated last year
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆91Updated last year
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆49Updated 3 months ago
- Jupyter Univere is a search engine for all infosec jupyter notebooks☆24Updated 2 months ago
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆39Updated this week
- Open Threat-Informed Detection Engineering☆37Updated last month
- ☆101Updated 8 months ago
- ATT&CK Sync is a Center for Threat-Informed Defense project that aims to improve the ability for organizations to consume MITRE ATT&CK® v…☆18Updated 2 months ago
- Cloud Analytics helps defenders detect attacks to their cloud infrastructure by developing behavioral analytics for cloud platforms as we…☆52Updated last year
- ☆84Updated last week
- Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. The research…☆35Updated this week
- A small security playground implementation of GHOSTS User Simulation framework with an Active Directory deployment and Elastic.☆14Updated 7 months ago
- Intelligence around common attacker behaviors (MITRE ATT&CK TTPs), in the form of ATT&CK Navigator "layer" json files.☆34Updated 2 years ago
- This repository contains generated contextual data utilized by pyattck.☆19Updated 7 months ago
- Adversarial Interception Mission Oriented Discovery and Disruption Framework, or AIMOD2, is a structured threat hunting approach to proac…☆86Updated last year
- Sensor Mappings to ATT&CK is a collection of resources to assist cyber defenders with understanding which sensors and events can help det…☆49Updated last week
- An example of how to deploy a Detection as Code pipeline using Sigma Rules, Sigmac, Gitlab CI, and Splunk.☆51Updated 2 years ago
- ☆100Updated last month
- Intel Retrieval Augmented Generation (RAG) Utilities☆90Updated last year
- ☆46Updated 3 weeks ago
- A comprehensive knowledge base for security professionals to keep track of and build defenses against API attack techniques.☆42Updated 5 months ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆30Updated 2 years ago