mitre / atomic
A MITRE Caldera plugin
☆42Updated 4 months ago
Alternatives and similar repositories for atomic:
Users that are interested in atomic are comparing it to the libraries listed below
- A CALDERA plugin☆76Updated last month
- Collects a listing of MITRE ATT&CK Techniques, then discovers Splunk ESCU detections for each technique☆67Updated last year
- This CALDERA Plugin converts Adversary Emulation Plans from the Center for Threat Informed Defense☆30Updated last month
- Threat Detection & Anomaly Detection rules for popular open-source components☆51Updated 2 years ago
- A CALDERA plugin☆22Updated last year
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆27Updated 3 weeks ago
- Library of threat hunts to get any user started!☆44Updated 4 years ago
- A pySigma wrapper and langchain toolkit for automatic rule creation/translation☆78Updated last week
- Automated detection rule analysis utility☆29Updated 2 years ago
- MITRE Shield website☆19Updated 3 years ago
- Automatic detection engineering technical state compliance☆55Updated 9 months ago
- A home for detection content developed by the delivr.to team☆67Updated 2 months ago
- YARA rule analyzer to improve rule quality and performance☆98Updated this week
- MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.☆63Updated last year
- SkillAegis is a platform to design, run, and monitor exercise scenarios, enhancing skills in applications like MISP and training users in…☆26Updated last month
- A collection of Sigma rules organized by MITRE ATT&CK technique☆17Updated 3 years ago
- A CALDERA plugin☆26Updated 8 months ago
- Pathfinder is a plugin for mapping network vulnerabilities, scanned by CALDERA or imported by a supported network scanner, and translatin…☆126Updated last week
- This repository contains OpenIOC rules to aid in hunting for indicators of compromise and TTPs focused on Advanced Persistent Threat grou…☆24Updated last year
- An elevated STIX representation of the MITRE ATT&CK Groups knowledge base☆23Updated 2 years ago
- ShellSweeping the evil.☆52Updated 9 months ago
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆76Updated last year
- Awesome Splunk SPL hunt queries that can be used to detect the latest vulnerability exploitation attempts & subsequent compromise☆61Updated 11 months ago
- Intelligence around common attacker behaviors (MITRE ATT&CK TTPs), in the form of ATT&CK Navigator "layer" json files.☆35Updated 2 years ago
- Small-scale threat emulation and detection range built on Elastic and Atomic Redteam.☆38Updated last year
- Mapping your datasources and detections to the MITRE ATT&CK Navigator framework.☆56Updated 4 years ago
- Import specific data sources into the Sigma generic and open signature format.☆78Updated 2 years ago
- A CALDERA plugin for ATT&CK Evaluations Round 1☆33Updated last year
- MISP-STIX-Converter - Python library to handle the conversion between MISP and STIX formats☆53Updated this week