ATT&CK Data Model (ADM): A TypeScript library for structured interaction with MITRE ATT&CK datasets. Uses Zod schemas, TypeScript types, and ES6 classes to provide a type-safe, object-oriented interface for STIX 2.1 formatted ATT&CK data. Features parsing, validation, and serialization capabilities.
☆82May 12, 2026Updated last week
Alternatives and similar repositories for attack-data-model
Users that are interested in attack-data-model are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- STIX data representing MITRE ATT&CK☆573May 12, 2026Updated last week
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆48Apr 28, 2026Updated 3 weeks ago
- A python module for working with ATT&CK☆707May 12, 2026Updated last week
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆417May 11, 2026Updated last week
- The Measure, Maximize, and Mature Threat-Informed Defense (M3TID) project defines what Threat-Informed Defense (TID) is and the key activ…☆17Jun 25, 2025Updated 10 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A script to create and assign SOP tasks into the cases☆20Aug 16, 2020Updated 5 years ago
- Defending IaaS with ATT&CK is a project to create a collection of ATT&CK techniques relevant to a Linux IaaS environment, as well as a me…☆14May 28, 2025Updated 11 months ago
- Personal fork of Kippo SSH honeypot.☆13May 25, 2014Updated 11 years ago
- Open-source Fabric templates for cybersecurity and compliance☆32Jan 13, 2025Updated last year
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆56Updated this week
- Graphs in Cybersecurity - Bloodhound☆20Oct 8, 2024Updated last year
- An open-source command-line tool for cybersecurity reporting automation and a configuration language for reusable templates. Reporting-as…☆71Jul 6, 2025Updated 10 months ago
- Online resources related to SOC Analysts. Incident investigation reference material, blogs, newsletters, good reads, books, trainings, po…☆56Feb 14, 2026Updated 3 months ago
- Sigma detection rules for hunting with the threathunting-keywords project☆60Mar 2, 2025Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Set of useful scrpts☆10Jan 4, 2015Updated 11 years ago
- Pokes users about outstanding security risks found by Crowdstrike Spotlight or vmware Workspace ONE so they secure their own endpoint.☆31Apr 13, 2026Updated last month
- CA Issuers Monitor (Authority Info Access)☆14Mar 8, 2023Updated 3 years ago
- Small web frontend for using openAI's GPT-3.5 and GPT-4's API☆59Updated this week
- ☆19Jul 21, 2022Updated 3 years ago
- Pentester plugin for Oh-My-Zsh. Boosting efficiency & and saving time with common initial tasks for pentesting☆19Jan 23, 2025Updated last year
- Mappings Explorer enables cyber defenders to understand how security controls and capabilities map onto the adversary behaviors catalogue…☆95Mar 2, 2026Updated 2 months ago
- Simulation of manufacturing systems☆15Mar 15, 2022Updated 4 years ago
- yara detection rules for hunting with the threathunting-keywords project☆162May 11, 2025Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆13Jan 20, 2020Updated 6 years ago
- 🚨ATTENTION🚨 The VERIS mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here …☆72Apr 3, 2024Updated 2 years ago
- Official repository for the Open Vulnerability and Assessment Language☆96Updated this week
- Rust implementation of the Process Herpaderping☆26Jul 6, 2023Updated 2 years ago
- Creating an ATT&CK Navigator layer with the detection coverage of the signals available within Tanium Threat Response.☆11Jun 2, 2021Updated 4 years ago
- Tabulate is a command-line tool to convert record type data (e.g. CSV files) into a pretty printed table.☆16Mar 1, 2020Updated 6 years ago
- Web app that provides basic navigation and annotation of ATT&CK matrices☆2,381May 11, 2026Updated last week
- Scripts for examples in the lectures notes for Optimal Control and Estimation☆12Nov 14, 2023Updated 2 years ago
- The repository contains IOCs in CSV format for APT, Cyber Crimes, Malware and Trojan and whatever I found as part of hunting and research☆12Jun 10, 2017Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Data Poisoning in Deep Learning: A Survey☆23Jan 18, 2026Updated 4 months ago
- Point of Concept: To help to automate the collection of evidence for SOC 2 Audits and etc.☆11May 13, 2024Updated 2 years ago
- The tutorial of "Kubernetes Security for Microservices"☆14Oct 3, 2023Updated 2 years ago
- Rapid Response sample Foundry app☆17Updated this week
- Creates an ATT&CK Navigator map of an Adversary Emulation Plan☆17Sep 4, 2021Updated 4 years ago
- ☆31Mar 6, 2024Updated 2 years ago
- poc or exp of some famous vulnerability☆14Mar 5, 2014Updated 12 years ago