ATT&CK Evaluations website (DEPRECATED)
☆62Apr 30, 2021Updated 4 years ago
Alternatives and similar repositories for attack-evals
Users that are interested in attack-evals are comparing it to the libraries listed below
Sorting:
- CARET - A tool for viewing cyber analytic relationships☆26Aug 21, 2020Updated 5 years ago
- Scripts and a (future) library to improve users' interactions with the ATT&CK content☆594Dec 11, 2023Updated 2 years ago
- OpenDXL Console is a high-level web-based console for interacting with a DXL fabric☆11Mar 29, 2021Updated 4 years ago
- A CALDERA plugin for ATT&CK Evaluations Round 1☆33Sep 14, 2023Updated 2 years ago
- MITRE ATT&CK Website☆570Updated this week
- Check Sigma rules for easy-to-bypass whitelists to make them more robust (https://github.com/SigmaHQ/sigma)☆15Feb 1, 2021Updated 5 years ago
- OpenDXL Broker is an open source version of a Data Exchange Layer (DXL) broker☆14Feb 11, 2024Updated 2 years ago
- Node.js SDK for IBM X-Force Exchange☆15Aug 20, 2018Updated 7 years ago
- Mock STIX data demonstrating the new data source representation☆16Sep 13, 2023Updated 2 years ago
- Cyber Analytics Repository☆984May 16, 2025Updated 9 months ago
- A collection of red team and adversary emulation resources developed and released by MITRE.☆531Apr 20, 2021Updated 4 years ago
- [DEPRECATED] An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This r…☆13Aug 16, 2023Updated 2 years ago
- Monitor Files and Folders for Changes in Real Time .☆11Jan 10, 2019Updated 7 years ago
- CloudEvents Transformation engine☆10Oct 12, 2021Updated 4 years ago
- This content is analysis and research of the data sources currently listed in ATT&CK.☆414Sep 13, 2023Updated 2 years ago
- Use to perform Microsoft exchange account brute-force.☆73Apr 17, 2021Updated 4 years ago
- Event metadata collected across all manifest-based ETW providers on Window 10 1903☆31Nov 25, 2019Updated 6 years ago
- Web app that provides basic navigation and annotation of ATT&CK matrices☆2,329Updated this week
- ☆11Mar 12, 2021Updated 4 years ago
- Incident Response Collections☆11Jul 24, 2018Updated 7 years ago
- A Powershell script that looks for specific emails in an exchange users mailbox, downloads the attachments, then marks those emails as re…☆17Apr 22, 2024Updated last year
- SIEM USE Case Selection Methodology☆17Sep 18, 2020Updated 5 years ago
- A Yara rule generator for finding related samples and hunting☆162Sep 11, 2022Updated 3 years ago
- PurpleSpray is an adversary simulation tool that executes password spray behavior under different scenarios and conditions with the purpo…☆51Aug 15, 2019Updated 6 years ago
- 📖 A repo of configuration examples for StackHawk's Hawkscan!☆18Jan 28, 2026Updated last month
- Collection of resources related to the Center for Threat-Informed Defense☆76May 22, 2024Updated last year
- Quick script to build host or investigation timelines using Carbon Black Response☆12Sep 25, 2018Updated 7 years ago
- ☆13Jun 13, 2017Updated 8 years ago
- My collection of awesome resources, tools, and other shiny things for cyber security stuffs.☆17Aug 31, 2018Updated 7 years ago
- Indicators of Normality☆11Jul 22, 2022Updated 3 years ago
- check cmd execute☆14Feb 4, 2017Updated 9 years ago
- Registry to JSON. This Project is for learning purposes and is not maintained.☆12Dec 28, 2021Updated 4 years ago
- Public repository for Red Canary Research☆38Oct 29, 2020Updated 5 years ago
- Anti-rootkit works as a Windows system driver.☆13Mar 14, 2022Updated 3 years ago
- Reworked version of https://golang.org/src/crypto/tls/generate_cert.go☆14Aug 21, 2023Updated 2 years ago
- A lightweight C++/C AFF4 reader library☆14Feb 5, 2026Updated 3 weeks ago
- Pre-configured environment that supports the development and running of OpenDXL solutions☆13Mar 29, 2021Updated 4 years ago
- ☆12Nov 9, 2017Updated 8 years ago
- It tells you when you VPN☆14Nov 22, 2022Updated 3 years ago