A datasource assessment on an event level to show potential coverage or the MITRE ATT&CK framework
☆357Nov 3, 2020Updated 5 years ago
Alternatives and similar repositories for ATTACKdatamap
Users that are interested in ATTACKdatamap are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Detect Tactics, Techniques & Combat Threats☆2,286Apr 29, 2026Updated last week
- A Splunk app mapped to MITRE ATT&CK to guide your threat hunts☆1,182Jul 26, 2023Updated 2 years ago
- Actionable analytics designed to combat threats☆1,009May 25, 2022Updated 3 years ago
- Open Source Security Events Metadata (OSSEM)☆1,293Feb 27, 2023Updated 3 years ago
- Tools to rapidly deploy a threat hunting capability on Azure Sentinel that leverages Sysmon and MITRE ATT&CK☆1,075Nov 28, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Re-play Security Events☆1,746Mar 20, 2024Updated 2 years ago
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,544Jan 12, 2026Updated 3 months ago
- Utilities for MITRE™ ATT&CK☆1,051Jan 3, 2026Updated 4 months ago
- A repository of sysmon configuration modules☆3,031Aug 21, 2024Updated last year
- Python Script to access ATT&CK content available in STIX via a public TAXII server☆569Dec 19, 2025Updated 4 months ago
- Windows Events Attack Samples☆2,554Jan 24, 2023Updated 3 years ago
- MITRE ATT&CK Windows Logging Cheat Sheets☆347Nov 8, 2018Updated 7 years ago
- Repository for my ATT&CK analysis research.☆70May 16, 2019Updated 6 years ago
- Mapping the MITRE ATT&CK Matrix with Osquery☆811May 11, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Praetorian's public release of our Metasploit automation of MITRE ATT&CK™ TTPs☆731Jan 21, 2020Updated 6 years ago
- ☆1,093May 1, 2019Updated 7 years ago
- Test Blue Team detections without running any attack.☆272May 2, 2024Updated 2 years ago
- A repository for using windows event forwarding for incident detection and response☆1,319Sep 8, 2025Updated 7 months ago
- Cyber Analytics Repository☆1,003May 16, 2025Updated 11 months ago
- Misc Threat Hunting Resources☆378Jan 26, 2023Updated 3 years ago
- A knowledge base of actionable Incident Response techniques☆665May 31, 2022Updated 3 years ago
- This content is analysis and research of the data sources currently listed in ATT&CK.☆413Sep 13, 2023Updated 2 years ago
- Automate the creation of a lab environment complete with security tooling and logging best practices☆4,954Jul 6, 2024Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Sources, configuration and how to detect evil things utilizing Microsoft Sysmon.☆939Dec 12, 2023Updated 2 years ago
- VECTR is a tool that facilitates tracking of your red and blue team testing activities to measure detection and prevention capabilities a…☆1,571Apr 24, 2026Updated last week
- Investigate suspicious activity by visualizing Sysmon's event log☆431Dec 22, 2023Updated 2 years ago
- TrustedSec Sysinternals Sysmon Community Guide☆1,403Feb 10, 2026Updated 2 months ago
- ☆53Mar 4, 2019Updated 7 years ago
- Splunk code (SPL) for serious threat hunters and detection engineers.☆293Jan 15, 2024Updated 2 years ago
- Compilation of resources to help with Adversary Simulation automation harness☆100Aug 7, 2020Updated 5 years ago
- ☆350Mar 19, 2021Updated 5 years ago
- Hackish nonsense to interact with the MITRE ATT&CK API via Python☆15Feb 2, 2021Updated 5 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,317Jan 22, 2025Updated last year
- Sample queries for Advanced hunting in Microsoft 365 Defender☆2,058Feb 17, 2022Updated 4 years ago
- Cyber Threat Intelligence Repository expressed in STIX 2.0☆2,054Apr 28, 2026Updated last week
- An Active Defense and EDR software to empower Blue Teams☆1,328Mar 31, 2026Updated last month
- The main project for the Unfetter-Discover application. This is the project that will hold the configuration files, the docker-compose f…☆415Dec 8, 2022Updated 3 years ago
- Advanced Sysmon ATT&CK configuration focusing on Detecting the Most Techniques per Data source in MITRE ATT&CK, Provide Visibility into …☆825Nov 5, 2023Updated 2 years ago
- Small and highly portable detection tests based on MITRE's ATT&CK.☆11,888Updated this week