quitehacker / MITRE-ATTACK-Enterprise-Matrix-in-Excel-for-SOCView external linksLinks
The Enhanced MITRE ATT&CK® Coverage Tracker is an Excel tool for SOCs to measure and improve detection coverage of cyber threats. It simplifies tracking of security readiness against ATT&CK® tactics and techniques, offering a customizable, user-friendly interface for SOC analysts.
☆34Nov 13, 2025Updated 3 months ago
Alternatives and similar repositories for MITRE-ATTACK-Enterprise-Matrix-in-Excel-for-SOC
Users that are interested in MITRE-ATTACK-Enterprise-Matrix-in-Excel-for-SOC are comparing it to the libraries listed below
Sorting:
- This Repository consists all Public Cheatsheets created by BlackPerl DFIR Content Team☆20Oct 9, 2024Updated last year
- Sigma Queries turned into KQL for Defender using pysigma☆12Jun 20, 2024Updated last year
- This tool can gather a lot of info without any defender alerts. It is useful for Penetration testers, SOC Analysts, System administrators…☆29Apr 9, 2025Updated 10 months ago
- The Measure, Maximize, and Mature Threat-Informed Defense (M3TID) project defines what Threat-Informed Defense (TID) is and the key activ…☆16Jun 25, 2025Updated 7 months ago
- Short deep dive into Threat Hunting on AWS☆17Oct 15, 2023Updated 2 years ago
- Extract CIS benchmarks from PDFs☆16Jul 26, 2023Updated 2 years ago
- A collection of open source threat detection rules created by Cyber Castle's team.☆14Jun 2, 2022Updated 3 years ago
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Apr 10, 2020Updated 5 years ago
- Easily create Splunk searches from Python and get the result as a Python object.☆14May 30, 2024Updated last year
- an excel-centric approach for the MITRE ATT&CK® Tactics and Techniques☆189May 5, 2022Updated 3 years ago
- A collection of dashboards, templates, API's and Power BI code for vulnerability management and analysis☆24Feb 2, 2025Updated last year
- ☆49Feb 22, 2023Updated 2 years ago
- CrowdStrike Falcon Queries For Advanced Threat Detection☆32Mar 1, 2025Updated 11 months ago
- ☆11Feb 9, 2023Updated 3 years ago
- Repository of scripts/tools that may be useful in Security Operations Centres (SOC)☆55Nov 25, 2020Updated 5 years ago
- This repository contains OpenIOC rules to aid in hunting for indicators of compromise and TTPs focused on Advanced Persistent Threat grou…☆26Oct 3, 2023Updated 2 years ago
- Standard-Format Threat Intelligence Feeds☆127Updated this week
- Red Team Stored XSS SVG phishing-companion tool with the ability to serve a malicious login page, or clone an html page and implement cus…☆30Mar 31, 2023Updated 2 years ago
- Dettectinator - The Python library to your DeTT&CT YAML files.☆119Jan 22, 2026Updated 3 weeks ago
- Command line tool to interact with Chronicle's Config Based Normalizer (CBN) APIs.☆32Aug 31, 2023Updated 2 years ago
- yara detection rules for hunting with the threathunting-keywords project☆157May 11, 2025Updated 9 months ago
- The "Let's-defend-solution" directory contains the answers to all paths of the Let's Defend platform that were saved by the creator 8 mon…☆12Apr 27, 2023Updated 2 years ago
- Automated threat intel feed parsing and consolidation💻👾🤖☆39Updated this week
- Cyber Threat Intelligence Feeds☆70May 3, 2024Updated last year
- Sigma is Generic Signature Format for SIEM Systems written by Florian Roth @Neo23x0 and Thomas Patzke. This repository is providing sprea…☆32Oct 16, 2019Updated 6 years ago
- Searches for Insider Threat Hunting☆30May 2, 2019Updated 6 years ago
- ETHICAL-HACKING☆12Dec 20, 2023Updated 2 years ago
- Perform file-based malware scan on your on-prem servers with AWS☆14Oct 31, 2023Updated 2 years ago
- A collection of phishing techniques used to evade detection. #nolockdown☆23Aug 28, 2025Updated 5 months ago
- ☆13Jun 26, 2025Updated 7 months ago
- Alternative password shadowing scheme☆10Dec 1, 2025Updated 2 months ago
- A penetration testing tool to help in Infrastructure pentesting process.☆11Sep 19, 2023Updated 2 years ago
- An SSH honeypot written entirely in Go.☆12Dec 4, 2025Updated 2 months ago
- Web interface to IntelMQ☆10Sep 10, 2025Updated 5 months ago
- Contains research.splunk.com site code☆11Apr 10, 2024Updated last year
- Event Query Router☆12Aug 9, 2019Updated 6 years ago
- ☆10Dec 5, 2017Updated 8 years ago
- Cybersecurity Ontology (CyberOnto) and Situational Awareness (CyberSA) help teamwork in Cyber Incident Responses, Control, Containment, a…☆10Sep 15, 2022Updated 3 years ago
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆281Mar 20, 2025Updated 10 months ago