Generate JSON force-directed/ node graph data from MITRE's ATTACK framework and visualize it interactively
☆38Apr 19, 2025Updated 10 months ago
Alternatives and similar repositories for ATTACK-Force-Graph
Users that are interested in ATTACK-Force-Graph are comparing it to the libraries listed below
Sorting:
- Threat Mapping Catalogue☆18Aug 10, 2021Updated 4 years ago
- Apply Machine Learning and Game Theory to improve the security of the Turris network of CZ.NIC☆24Sep 24, 2019Updated 6 years ago
- Kestrel Jupyter Notebook Kernel☆10Oct 19, 2023Updated 2 years ago
- A repository of Sysmon For Linux configuration modules☆16Oct 14, 2021Updated 4 years ago
- STIX2 graph visualisation library in JS☆95Feb 7, 2026Updated 3 weeks ago
- An informational repo about hunting for adversaries in your IT environment.☆14Apr 10, 2017Updated 8 years ago
- An Attack Graphs Extension for Draw.io☆17Sep 4, 2025Updated 5 months ago
- Open Source Intelligence (OSINT) Tool List for Cyber Threat Intelligence Researchers☆22May 4, 2024Updated last year
- Exporting MISP event attributes to yara rules usable with Thor apt scanner☆24Mar 27, 2017Updated 8 years ago
- Collection of Jupyter Notebook for Threat Hunting and Blue Team Purposes☆22Jun 15, 2022Updated 3 years ago
- Web UI for testing Elastic Beats processors☆18Feb 22, 2026Updated last week
- A template for documenting penetration tests with OneNote.☆21Feb 15, 2020Updated 6 years ago
- The repository implement the LMTracker model based on paper: LMTracker: Lateral movement path detection based on heterogeneous graph embe…☆17Jul 12, 2023Updated 2 years ago
- 🚨ATTENTION🚨 The CVE mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here as…☆240Apr 3, 2024Updated last year
- A collection of Covid-19 related threat intelligence and resources.☆19Jul 17, 2020Updated 5 years ago
- A few quick recipes for those that do not have much time during the day☆22Oct 28, 2024Updated last year
- CTI database generator and public dataset☆21Jan 12, 2020Updated 6 years ago
- ☆25Jun 11, 2021Updated 4 years ago
- INACTIVE - http://mzl.la/ghe-archive - Zeek Extreme Performance Tuning☆26Oct 10, 2019Updated 6 years ago
- ☆35Jun 22, 2021Updated 4 years ago
- An open source Governance Risk Compliance (GRC) solution for corporates and government☆34Jul 10, 2017Updated 8 years ago
- You're busted!☆27Dec 16, 2019Updated 6 years ago
- OSSEM Detection Model☆183Oct 11, 2022Updated 3 years ago
- A collection of awesome software, libraries, documents, books, resources and cool stuff about industrial control systems in cybersecurity…☆34Feb 9, 2025Updated last year
- Insider threat detection with heterogeneous graph in CERT dataset.☆27Dec 21, 2021Updated 4 years ago
- A cyber threat intelligence server based on TAXII 2 and written in Golang☆32Sep 19, 2019Updated 6 years ago
- Detects cyber threats to the end user with machine learning. This tool can do malware analysis of given exe file, spam analysis of given …☆25May 28, 2022Updated 3 years ago
- OCA-wide documentation shared by all sub-projects and repositories☆33Oct 31, 2024Updated last year
- The "Let's-defend-solution" directory contains the answers to all paths of the Let's Defend platform that were saved by the creator 8 mon…☆12Apr 27, 2023Updated 2 years ago
- Extracting Attack Behavior from Threat Reports☆81Apr 28, 2023Updated 2 years ago
- Privescker - make life easier by dumping all your common Windows enum, privesc and post exploitation scripts and tools on to the box in o…☆45Apr 4, 2022Updated 3 years ago
- ☆12Sep 9, 2023Updated 2 years ago
- ☆33Oct 27, 2016Updated 9 years ago
- TAXII 2.0 Server implemented in Node JS with MongoDB backend☆12Jan 3, 2023Updated 3 years ago
- Tools for the OSCAL project☆37Mar 16, 2023Updated 2 years ago
- SHADEWATCHER: Recommendation-guided Cyber Threat Analysis using System Audit Records, Oakland'22☆83Jun 6, 2023Updated 2 years ago
- KRYSTAL: Knowledge Graph-based Framework for Tactical Attack Discovery in Audit Data☆41Apr 25, 2024Updated last year
- Notes on managing and coordinating the response to major cyber incidents☆41May 30, 2020Updated 5 years ago
- How to install macOS Big Sur on an Unsupported Mac : Example: MacBook Pro Late 2011☆10Feb 27, 2021Updated 5 years ago