The Enhanced MITRE ATT&CK® Coverage Tracker is an Excel tool for SOCs to measure and improve detection coverage of cyber threats. It simplifies tracking of security readiness against ATT&CK® tactics and techniques, offering a customizable, user-friendly interface for SOC analysts.
☆34Nov 13, 2025Updated 3 months ago
Alternatives and similar repositories for MITRE-ATTACK-Enterprise-Matrix-in-Excel-for-SOC
Users that are interested in MITRE-ATTACK-Enterprise-Matrix-in-Excel-for-SOC are comparing it to the libraries listed below
Sorting:
- ☆37Nov 9, 2025Updated 4 months ago
- This tool can gather a lot of info without any defender alerts. It is useful for Penetration testers, SOC Analysts, System administrators…☆29Apr 9, 2025Updated 10 months ago
- Short deep dive into Threat Hunting on AWS☆17Oct 15, 2023Updated 2 years ago
- The Measure, Maximize, and Mature Threat-Informed Defense (M3TID) project defines what Threat-Informed Defense (TID) is and the key activ…☆16Jun 25, 2025Updated 8 months ago
- Extract CIS benchmarks from PDFs☆16Jul 26, 2023Updated 2 years ago
- A collection of open source threat detection rules created by Cyber Castle's team.☆14Jun 2, 2022Updated 3 years ago
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Apr 10, 2020Updated 5 years ago
- ONYX: Cisco Automated Assessment and Auditing Tool (CAAAT). An open-source tool that automatically assesses and audits Cisco IOS routers …☆21May 6, 2025Updated 10 months ago
- A collection of dashboards, templates, API's and Power BI code for vulnerability management and analysis☆24Feb 2, 2025Updated last year
- ☆49Feb 22, 2023Updated 3 years ago
- ☆35Jun 22, 2021Updated 4 years ago
- CrowdStrike Falcon Queries For Advanced Threat Detection☆34Mar 1, 2025Updated last year
- Repository of scripts/tools that may be useful in Security Operations Centres (SOC)☆56Nov 25, 2020Updated 5 years ago
- Standard-Format Threat Intelligence Feeds☆127Updated this week
- ☆28Nov 25, 2025Updated 3 months ago
- Dettectinator - The Python library to your DeTT&CT YAML files.☆118Jan 22, 2026Updated last month
- Command line tool to interact with Chronicle's Config Based Normalizer (CBN) APIs.☆32Aug 31, 2023Updated 2 years ago
- yara detection rules for hunting with the threathunting-keywords project☆157May 11, 2025Updated 9 months ago
- Automated threat intel feed parsing and consolidation💻👾🤖☆40Updated this week
- The "Let's-defend-solution" directory contains the answers to all paths of the Let's Defend platform that were saved by the creator 8 mon…☆12Apr 27, 2023Updated 2 years ago
- Sigma is Generic Signature Format for SIEM Systems written by Florian Roth @Neo23x0 and Thomas Patzke. This repository is providing sprea…☆33Oct 16, 2019Updated 6 years ago
- Searches for Insider Threat Hunting☆29May 2, 2019Updated 6 years ago
- 🌌 Real-time threat detection for smart contracts☆10May 16, 2023Updated 2 years ago
- CyberX-AI-Digital-Twin is an AI-powered cybersecurity platform that uses digital twin technology to simulate, detect, and analyze cyber t…☆14Feb 13, 2025Updated last year
- ETHICAL-HACKING☆12Dec 20, 2023Updated 2 years ago
- Impacket is a collection of Python classes for working with network protocols.☆38Oct 13, 2021Updated 4 years ago
- Event Query Router☆12Aug 9, 2019Updated 6 years ago
- Contains research.splunk.com site code☆11Apr 10, 2024Updated last year
- An SSH honeypot written entirely in Go.☆12Dec 4, 2025Updated 3 months ago
- ☆10Dec 5, 2017Updated 8 years ago
- Cybersecurity Ontology (CyberOnto) and Situational Awareness (CyberSA) help teamwork in Cyber Incident Responses, Control, Containment, a…☆10Sep 15, 2022Updated 3 years ago
- Perform file-based malware scan on your on-prem servers with AWS☆14Oct 31, 2023Updated 2 years ago
- Alternative password shadowing scheme☆10Feb 22, 2026Updated 2 weeks ago
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆282Mar 20, 2025Updated 11 months ago
- This repo contains example of raw event examples and possible translations to the OCSF schema.☆56Jul 31, 2025Updated 7 months ago
- This repository contains supplemental items including IOCs, and signatures discussed in Huntress blogposts, and other media.☆47Feb 27, 2026Updated last week
- ☆193Mar 11, 2024Updated last year
- CLI generator for Velociraptor offline collector☆16Oct 10, 2025Updated 4 months ago
- domain information in JSON format☆10Jun 7, 2017Updated 8 years ago