ATT&CK Data Model (ADM): A TypeScript library for structured interaction with MITRE ATT&CK datasets. Uses Zod schemas, TypeScript types, and ES6 classes to provide a type-safe, object-oriented interface for STIX 2.1 formatted ATT&CK data. Features parsing, validation, and serialization capabilities.
☆77Feb 17, 2026Updated 2 months ago
Alternatives and similar repositories for attack-data-model
Users that are interested in attack-data-model are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- STIX data representing MITRE ATT&CK☆561Dec 23, 2025Updated 4 months ago
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆47Feb 13, 2026Updated 2 months ago
- A python module for working with ATT&CK☆694Updated this week
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆415Apr 20, 2026Updated last week
- The Measure, Maximize, and Mature Threat-Informed Defense (M3TID) project defines what Threat-Informed Defense (TID) is and the key activ…☆17Jun 25, 2025Updated 10 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A script to create and assign SOP tasks into the cases☆20Aug 16, 2020Updated 5 years ago
- Defending IaaS with ATT&CK is a project to create a collection of ATT&CK techniques relevant to a Linux IaaS environment, as well as a me…☆14May 28, 2025Updated 11 months ago
- TIBER-Cases is a project created to give cases of The Hive platform for Threat Intelligence Analysts mainly. All the cases are mapped to …☆27Jul 13, 2022Updated 3 years ago
- Open-source Fabric templates for cybersecurity and compliance☆32Jan 13, 2025Updated last year
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆56Updated this week
- A dockerized version of the sof-elk project☆13Jul 1, 2020Updated 5 years ago
- A web front-end providing a REST-ful API to mount and unmount forensic disk images☆22Feb 14, 2026Updated 2 months ago
- Online resources related to SOC Analysts. Incident investigation reference material, blogs, newsletters, good reads, books, trainings, po…☆55Feb 14, 2026Updated 2 months ago
- ☆29Nov 25, 2025Updated 5 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- LVCS@Tesla.com☆12Jan 16, 2026Updated 3 months ago
- CA Issuers Monitor (Authority Info Access)☆14Mar 8, 2023Updated 3 years ago
- Pokes users about outstanding security risks found by Crowdstrike Spotlight or vmware Workspace ONE so they secure their own endpoint.☆31Apr 13, 2026Updated 2 weeks ago
- Small web frontend for using openAI's GPT-3.5 and GPT-4's API☆59Apr 9, 2025Updated last year
- ☆19Jul 21, 2022Updated 3 years ago
- Pentester plugin for Oh-My-Zsh. Boosting efficiency & and saving time with common initial tasks for pentesting☆19Jan 23, 2025Updated last year
- AgentFence is an open-source platform for automatically testing AI agent security. It identifies vulnerabilities such as prompt injection…☆54Mar 6, 2025Updated last year
- 福昕Foxit PDF远程代码执行漏洞CVE-2023-27363分析与复现☆11Jul 6, 2023Updated 2 years ago
- yara detection rules for hunting with the threathunting-keywords project☆160May 11, 2025Updated 11 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆13Jan 20, 2020Updated 6 years ago
- 🚨ATTENTION🚨 The VERIS mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here …☆72Apr 3, 2024Updated 2 years ago
- A thin wrapper of HTTPretty for pytest☆21May 26, 2019Updated 6 years ago
- ☆10Dec 19, 2024Updated last year
- Tabulate is a command-line tool to convert record type data (e.g. CSV files) into a pretty printed table.☆16Mar 1, 2020Updated 6 years ago
- Cyber Threat Intelligence Repository expressed in STIX 2.0☆2,049Dec 19, 2025Updated 4 months ago
- The repository contains IOCs in CSV format for APT, Cyber Crimes, Malware and Trojan and whatever I found as part of hunting and research☆12Jun 10, 2017Updated 8 years ago
- Point of Concept: To help to automate the collection of evidence for SOC 2 Audits and etc.☆11May 13, 2024Updated last year
- The tutorial of "Kubernetes Security for Microservices"☆14Oct 3, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆14Aug 27, 2022Updated 3 years ago
- Rapid Response sample Foundry app☆17Updated this week
- Creates an ATT&CK Navigator map of an Adversary Emulation Plan☆17Sep 4, 2021Updated 4 years ago
- Registry for all GrafanaLabs kinds.☆15Feb 26, 2026Updated 2 months ago
- poc or exp of some famous vulnerability☆14Mar 5, 2014Updated 12 years ago
- Resources for Cyber Security☆11Oct 30, 2018Updated 7 years ago
- Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. The research…☆58Mar 2, 2026Updated last month