ATT&CK Data Model (ADM): A TypeScript library for structured interaction with MITRE ATT&CK datasets. Uses Zod schemas, TypeScript types, and ES6 classes to provide a type-safe, object-oriented interface for STIX 2.1 formatted ATT&CK data. Features parsing, validation, and serialization capabilities.
☆72Feb 17, 2026Updated last month
Alternatives and similar repositories for attack-data-model
Users that are interested in attack-data-model are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- STIX data representing MITRE ATT&CK☆548Dec 23, 2025Updated 3 months ago
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆46Feb 13, 2026Updated last month
- A python module for working with ATT&CK☆679Apr 1, 2026Updated last week
- The Measure, Maximize, and Mature Threat-Informed Defense (M3TID) project defines what Threat-Informed Defense (TID) is and the key activ…☆16Jun 25, 2025Updated 9 months ago
- Defending IaaS with ATT&CK is a project to create a collection of ATT&CK techniques relevant to a Linux IaaS environment, as well as a me…☆14May 28, 2025Updated 10 months ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Personal fork of Kippo SSH honeypot.☆13May 25, 2014Updated 11 years ago
- Open-source Fabric templates for cybersecurity and compliance☆31Jan 13, 2025Updated last year
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆55Apr 1, 2026Updated last week
- OCSF (https://schema.ocsf.io/) models in Python using Pydantic.☆36Apr 1, 2026Updated last week
- Graphs in Cybersecurity - Bloodhound☆20Oct 8, 2024Updated last year
- AgentFence is an open-source platform for automatically testing AI agent security. It identifies vulnerabilities such as prompt injection…☆53Mar 6, 2025Updated last year
- Sigma detection rules for hunting with the threathunting-keywords project☆59Mar 2, 2025Updated last year
- Pokes users about outstanding security risks found by Crowdstrike Spotlight or vmware Workspace ONE so they secure their own endpoint.☆30Updated this week
- Small web frontend for using openAI's GPT-3.5 and GPT-4's API☆59Apr 9, 2025Updated last year
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- ☆19Jul 21, 2022Updated 3 years ago
- Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogue…☆92Mar 2, 2026Updated last month
- 福昕Foxit PDF远程代码执行漏洞CVE-2023-27363分析与复现☆11Jul 6, 2023Updated 2 years ago
- Simulation of manufacturing systems☆15Mar 15, 2022Updated 4 years ago
- yara detection rules for hunting with the threathunting-keywords project☆158May 11, 2025Updated 10 months ago
- ☆13Jan 20, 2020Updated 6 years ago
- Official repository for the Open Vulnerability and Assessment Language☆94Dec 1, 2025Updated 4 months ago
- 🚨ATTENTION🚨 The VERIS mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here …☆72Apr 3, 2024Updated 2 years ago
- A project that enables identification and classification of an intent of a message with dynamic labels☆52Dec 17, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Attack Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by devel…☆726Nov 14, 2025Updated 4 months ago
- The repository contains IOCs in CSV format for APT, Cyber Crimes, Malware and Trojan and whatever I found as part of hunting and research☆12Jun 10, 2017Updated 8 years ago
- Data Poisoning in Deep Learning: A Survey☆22Jan 18, 2026Updated 2 months ago
- Point of Concept: To help to automate the collection of evidence for SOC 2 Audits and etc.☆11May 13, 2024Updated last year
- ☆14Aug 27, 2022Updated 3 years ago
- Python logging handler for Loki☆18Dec 12, 2025Updated 3 months ago
- ArchiSurance Case Study☆28May 22, 2017Updated 8 years ago
- Resources for Cyber Security☆11Oct 30, 2018Updated 7 years ago
- A tool to modify timestamps in a packet capture to a user selected date☆31Aug 11, 2021Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. The research…☆57Mar 2, 2026Updated last month
- R package for users of data from https://motus.org☆21Feb 2, 2026Updated 2 months ago
- Python library to access the fatsecret API☆15Nov 4, 2021Updated 4 years ago
- GreenLambert macOS IDA plugin to deobfuscate strings☆14Oct 4, 2021Updated 4 years ago
- AltSH (alternative shell script) formatter with support for ShellSpec and shpec syntax (experimental)☆15Jun 22, 2024Updated last year
- Scripts and outputs for ATLAS data in STIX JSON and ATT&CK Navigator layer formats☆28Mar 31, 2026Updated last week
- Cyber Threat Intelligence Repository expressed in STIX 2.0☆2,046Dec 19, 2025Updated 3 months ago