Web app that provides basic navigation and annotation of ATT&CK matrices
☆2,368Apr 21, 2026Updated this week
Alternatives and similar repositories for attack-navigator
Users that are interested in attack-navigator are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Cyber Threat Intelligence Repository expressed in STIX 2.0☆2,049Dec 19, 2025Updated 4 months ago
- Detect Tactics, Techniques & Combat Threats☆2,282Jan 21, 2026Updated 3 months ago
- Automated Adversary Emulation Platform☆6,919Updated this week
- Small and highly portable detection tests based on MITRE's ATT&CK.☆11,860Updated this week
- MITRE ATT&CK Website☆574Updated this week
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- A python module for working with ATT&CK☆688Updated this week
- Cyber Analytics Repository☆999May 16, 2025Updated 11 months ago
- Scripts and a (future) library to improve users' interactions with the ATT&CK content☆594Dec 11, 2023Updated 2 years ago
- Main Sigma Rule Repository☆10,355Updated this week
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,537Jan 12, 2026Updated 3 months ago
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆415Updated this week
- Actionable analytics designed to combat threats☆1,007May 25, 2022Updated 3 years ago
- Utilities for MITRE™ ATT&CK☆1,052Jan 3, 2026Updated 3 months ago
- Open Source Security Events Metadata (OSSEM)☆1,292Feb 27, 2023Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Threat Report ATT&CK™ Mapping (TRAM) is a tool to aid analyst in mapping finished reports to ATT&CK.☆354Oct 6, 2021Updated 4 years ago
- Re-play Security Events☆1,738Mar 20, 2024Updated 2 years ago
- ☆1,092May 1, 2019Updated 6 years ago
- MISP (core software) - Open Source Threat Intelligence and Sharing Platform☆6,256Updated this week
- A repository of sysmon configuration modules☆3,027Aug 21, 2024Updated last year
- A toolset to make a system look as if it was the victim of an APT attack☆2,734Sep 23, 2025Updated 7 months ago
- STIX data representing MITRE ATT&CK☆561Dec 23, 2025Updated 4 months ago
- Automate the creation of a lab environment complete with security tooling and logging best practices☆4,950Jul 6, 2024Updated last year
- TheHive is a Collaborative Case Management Platform, now distributed as a commercial version☆3,905Jul 25, 2025Updated 9 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- VECTR is a tool that facilitates tracking of your red and blue team testing activities to measure detection and prevention capabilities a…☆1,569Updated this week
- This content is analysis and research of the data sources currently listed in ATT&CK.☆413Sep 13, 2023Updated 2 years ago
- Python Script to access ATT&CK content available in STIX via a public TAXII server☆569Dec 19, 2025Updated 4 months ago
- An information security preparedness tool to do adversarial simulation.☆1,138Apr 1, 2019Updated 7 years ago
- A Splunk app mapped to MITRE ATT&CK to guide your threat hunts☆1,178Jul 26, 2023Updated 2 years ago
- An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.☆2,093May 28, 2025Updated 10 months ago
- Tools to rapidly deploy a threat hunting capability on Azure Sentinel that leverages Sysmon and MITRE ATT&CK☆1,075Nov 28, 2024Updated last year
- The Hunting ELK☆3,919Jun 1, 2024Updated last year
- A set of Zeek scripts to detect ATT&CK techniques.☆622Jun 26, 2024Updated last year
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Windows Events Attack Samples☆2,550Jan 24, 2023Updated 3 years ago
- Six Degrees of Domain Admin☆10,529Mar 2, 2026Updated last month
- A collection of red team and adversary emulation resources developed and released by MITRE.☆536Apr 20, 2021Updated 5 years ago
- Sysmon configuration file template with default high-quality event tracing☆5,493Jul 3, 2024Updated last year
- A curated list of Awesome Threat Intelligence resources☆10,116Jan 19, 2026Updated 3 months ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,510Jan 12, 2026Updated 3 months ago
- Digging Deeper....☆3,915Updated this week