osV22 / ATTACK-Force-GraphLinks
Generate JSON force-directed/ node graph data from MITRE's ATTACK framework and visualize it interactively
☆34Updated 2 months ago
Alternatives and similar repositories for ATTACK-Force-Graph
Users that are interested in ATTACK-Force-Graph are comparing it to the libraries listed below
Sorting:
- This repository contains OpenIOC rules to aid in hunting for indicators of compromise and TTPs focused on Advanced Persistent Threat grou…☆25Updated last year
- An Adaptive Misuse Detection System☆42Updated 7 months ago
- Threat Mapping Catalogue☆17Updated 3 years ago
- STIX 2.1 Visualizer, Attack and Activity Thread Graph for Threat Modeling☆32Updated 6 months ago
- Import Mitre Att&ck into Neo4j database☆36Updated 2 years ago
- Threat Detection & Anomaly Detection rules for popular open-source components☆52Updated 2 years ago
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆35Updated 2 years ago
- Sightings Ecosystem gives cyber defenders visibility into what adversaries actually do in the wild. With your help, we are tracking MITRE…☆35Updated 3 weeks ago
- Automatic detection engineering technical state compliance☆55Updated 11 months ago
- ☆25Updated last year
- Globally distributed honeypots and HoneyNets IOCs and file reversing☆16Updated last year
- A MITRE Caldera plugin☆43Updated 7 months ago
- Sensor Mappings to ATT&CK is a collection of resources to assist cyber defenders with understanding which sensors and events can help det…☆50Updated this week
- Threat Detection Rules (Snort/Sigma/Yara)☆13Updated last year
- DGA Detective - Hunt domains generated by Domain Generation Algorithms to identify malware traffic☆42Updated 10 months ago
- MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.☆65Updated last year
- Small web frontend for using openAI's GPT-3.5 and GPT-4's API☆55Updated 2 months ago
- ☆43Updated 2 years ago
- Library of threat hunts to get any user started!☆44Updated 4 years ago
- Look into EDR events from network☆23Updated last month
- Collection of Jupyter Notebook for Threat Hunting and Blue Team Purposes☆20Updated 3 years ago
- The project will serve as a central repository for VMware Threat Analysis Unit (TAU) to share threat intelligence with the security commu…☆17Updated 2 years ago
- Automated detection rule analysis utility☆29Updated 2 years ago
- An elevated STIX representation of the MITRE ATT&CK Groups knowledge base☆23Updated 3 years ago
- A library and command line tool for extracting indicators of compromise (IOCs) from security reports in PDF, HTML, Word, or text format☆34Updated this week
- An extension of the sigma standard to include security metrics.☆15Updated 2 years ago
- A repository of Sysmon For Linux configuration modules☆15Updated 3 years ago
- This program generates cyber attack scenarios for use in cyber training exercises, red team planning, blue team planning, automated attac…☆27Updated 4 years ago
- Factual-rules-generator is an open source project which aims to generate YARA rules about installed software from a machine.☆76Updated 3 years ago
- Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.☆16Updated 4 years ago