The Enhanced MITRE ATT&CK® Coverage Tracker is an Excel tool for SOCs to measure and improve detection coverage of cyber threats. It simplifies tracking of security readiness against ATT&CK® tactics and techniques, offering a customizable, user-friendly interface for SOC analysts.
☆36Nov 13, 2025Updated 5 months ago
Alternatives and similar repositories for MITRE-ATTACK-Enterprise-Matrix-in-Excel-for-SOC
Users that are interested in MITRE-ATTACK-Enterprise-Matrix-in-Excel-for-SOC are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This Repository consists all Public Cheatsheets created by BlackPerl DFIR Content Team☆20Oct 9, 2024Updated last year
- Sigma Queries turned into KQL for Defender using pysigma☆12Mar 29, 2026Updated last month
- ☆37Updated this week
- an excel-centric approach for the MITRE ATT&CK® Tactics and Techniques☆188May 5, 2022Updated 4 years ago
- This tool can gather a lot of info without any defender alerts. It is useful for Penetration testers, SOC Analysts, System administrators…☆29Apr 9, 2025Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Short deep dive into Threat Hunting on AWS☆19Oct 15, 2023Updated 2 years ago
- Easily create Splunk searches from Python and get the result as a Python object.☆14May 30, 2024Updated last year
- CyberX-AI-Digital-Twin is an AI-powered cybersecurity platform that uses digital twin technology to simulate, detect, and analyze cyber t…☆14Feb 13, 2025Updated last year
- Windows / Linux Local Privilege Escalation Workshop☆11Jan 15, 2019Updated 7 years ago
- CrowdStrike Falcon Queries For Advanced Threat Detection☆34Mar 1, 2025Updated last year
- Searches for Insider Threat Hunting☆30May 2, 2019Updated 7 years ago
- ☆48Feb 22, 2023Updated 3 years ago
- Cyber Threat Intelligence Feeds☆73May 3, 2024Updated 2 years ago
- Extract CIS benchmarks from PDFs☆16Jul 26, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A collection of dashboards, templates, API's and Power BI code for vulnerability management and analysis☆23Feb 2, 2025Updated last year
- Simple script to generate commands to achieve reverse shells.☆12Aug 12, 2019Updated 6 years ago
- ☆35Jun 22, 2021Updated 4 years ago
- ☆16Aug 2, 2025Updated 9 months ago
- Alternative password shadowing scheme☆10Feb 22, 2026Updated 2 months ago
- ☆11Feb 9, 2023Updated 3 years ago
- ☆11Jun 12, 2023Updated 2 years ago
- This repository contains OpenIOC rules to aid in hunting for indicators of compromise and TTPs focused on Advanced Persistent Threat grou…☆26Oct 3, 2023Updated 2 years ago
- Threat Detection & Anomaly Detection rules for popular open-source components☆53Jul 27, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Standard-Format Threat Intelligence Feeds☆129May 1, 2026Updated last week
- Automated threat intel feed parsing and consolidation💻👾🤖☆41Updated this week
- Generates a detailed CSV file containing Sigma Rules statistics for each service or category, and each level, offering a holistic view of…☆10Dec 22, 2023Updated 2 years ago
- Cisco Threat Intelligence API☆76Updated this week
- ReverShellGenerator - A tool to generate various ways to do a reverse shell☆12Mar 2, 2019Updated 7 years ago
- Forensic tool for extracting and analyzing Google DriveFS cached files and metadata.☆20May 9, 2025Updated last year
- 🌌 Real-time threat detection for smart contracts☆10May 16, 2023Updated 2 years ago
- Python script for carving Bitlocker VMK keys☆26Feb 4, 2026Updated 3 months ago
- Event Query Router☆12Aug 9, 2019Updated 6 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆29Nov 25, 2025Updated 5 months ago
- “Intelliroot Code Injection Hunter” is a tool that can to help you identify injected malicious code. The tool can identify and extract po…☆16Sep 21, 2022Updated 3 years ago
- Repository of scripts/tools that may be useful in Security Operations Centres (SOC)☆57Nov 25, 2020Updated 5 years ago
- This directory contains random scripts from threat hunting or malware research☆11Feb 15, 2018Updated 8 years ago
- A collection of resources related to vulnerability management.☆15Aug 8, 2023Updated 2 years ago
- ☆31Aug 13, 2025Updated 8 months ago
- Splunk Content Control Tool☆132Apr 28, 2026Updated last week