Generate JSON force-directed/ node graph data from MITRE's ATTACK framework and visualize it interactively
☆38Apr 19, 2025Updated 11 months ago
Alternatives and similar repositories for ATTACK-Force-Graph
Users that are interested in ATTACK-Force-Graph are comparing it to the libraries listed below
Sorting:
- Threat Mapping Catalogue☆18Aug 10, 2021Updated 4 years ago
- Apply Machine Learning and Game Theory to improve the security of the Turris network of CZ.NIC☆24Sep 24, 2019Updated 6 years ago
- An Attack Graphs Extension for Draw.io☆17Sep 4, 2025Updated 6 months ago
- An informational repo about hunting for adversaries in your IT environment.☆14Apr 10, 2017Updated 8 years ago
- STIX 2.1 Visualizer, Attack and Activity Thread Graph for Threat Modeling☆33Dec 9, 2024Updated last year
- Research into Undocumented Behavior of Azure AD Refresh Tokens☆13Oct 27, 2023Updated 2 years ago
- STIX2 graph visualisation library in JS☆96Feb 7, 2026Updated last month
- A collection of awesome software, libraries, documents, books, resources and cool stuff about industrial control systems in cybersecurity…☆35Feb 9, 2025Updated last year
- A framework for synthesizing lateral movement login data.☆27May 20, 2021Updated 4 years ago
- 🚨ATTENTION🚨 The CVE mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here as…☆240Apr 3, 2024Updated last year
- A few quick recipes for those that do not have much time during the day☆22Oct 28, 2024Updated last year
- DARPA's Cyber Assured Systems Engineering (CASE) project named Verification Evidence and Resilient Design in Anticipation of Cybersecurit…☆48Aug 22, 2024Updated last year
- This tool is designed to seamlessly convert Postman collections into OpenAPI schemas. This conversion is essential for API security testi…☆12Sep 3, 2024Updated last year
- Master PDF Summarization with Google Bard☆13Feb 29, 2024Updated 2 years ago
- Repo for user submitted stencils☆13Jun 9, 2022Updated 3 years ago
- CTI database generator and public dataset☆22Jan 12, 2020Updated 6 years ago
- Correlate NVD datasets wIth CWE/CAPEC/CVSS labels for customised usage. Plus static analysis and data visualisation.☆13Nov 17, 2023Updated 2 years ago
- Sightings Ecosystem gives cyber defenders visibility into what adversaries actually do in the wild. With your help, we are tracking MITRE…☆38May 28, 2025Updated 9 months ago
- A tool for Pentesters & BugHunters to collect IPs of company, server, Operating System & many more☆13Dec 20, 2022Updated 3 years ago
- OSSEM Detection Model☆184Oct 11, 2022Updated 3 years ago
- The original code for SCARA: Scalable Graph Neural Networks with Feature-Oriented Optimization (VLDB 2022) and Scalable Decoupling Graph …☆13Mar 8, 2024Updated 2 years ago
- SHADEWATCHER: Recommendation-guided Cyber Threat Analysis using System Audit Records, Oakland'22☆83Jun 6, 2023Updated 2 years ago
- Open Source Intelligence (OSINT) Tool List for Cyber Threat Intelligence Researchers☆23May 4, 2024Updated last year
- Stores Azure DC IP addresses☆13Nov 15, 2024Updated last year
- KRYSTAL: Knowledge Graph-based Framework for Tactical Attack Discovery in Audit Data☆41Apr 25, 2024Updated last year
- Import Mitre Att&ck into Neo4j database☆39Mar 5, 2026Updated 2 weeks ago
- This work shows the viability of automatically generated attack graphs that are used for adversary behavior execution in industrial contr…☆12Jun 3, 2021Updated 4 years ago
- A Docker lab integrating Splunk SIEM with Ollama LLM via MCP for AI security operations. Features Promptfoo OWASP evaluation, TA-ollama a…☆28Mar 8, 2026Updated last week
- improve mulval to accommodate some updates and make it more suitable for industrial control network☆12Nov 22, 2022Updated 3 years ago
- A Red Team Script to Detect Canary Tokens and Seed Files☆15Jan 2, 2024Updated 2 years ago
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Jan 30, 2024Updated 2 years ago
- Interactive simulation of a fictional ransomware group's dashboard☆12Sep 30, 2024Updated last year
- A collection of Covid-19 related threat intelligence and resources.☆19Jul 17, 2020Updated 5 years ago
- ☆10Oct 17, 2020Updated 5 years ago
- Tutorial on TikZ☆14Nov 15, 2024Updated last year
- Bring Your Own Mitre Att&ck © Matrix !☆13Oct 19, 2023Updated 2 years ago
- A template for documenting penetration tests with OneNote.☆21Feb 15, 2020Updated 6 years ago
- ☆44Jul 11, 2025Updated 8 months ago
- 3" and 3.5" drone FPV frame compatible with Air Unit O3 and designed for Freestyle, Freeride and Cinematic. Many customizable options ava…☆20Sep 2, 2025Updated 6 months ago