sduff / mitre_attack_csv
MITRE ATT&CK in CSV form
☆20Updated 2 years ago
Alternatives and similar repositories for mitre_attack_csv:
Users that are interested in mitre_attack_csv are comparing it to the libraries listed below
- A community event for security researchers to share their favorite notebooks☆107Updated last year
- The Infosec Community Definitive Guide to Jupyter Notebooks☆121Updated 4 years ago
- Provides detection capabilities and log conversion to evtx or syslog capabilities☆52Updated 2 years ago
- OSSEM Common Data Model☆55Updated 2 years ago
- Convert Sigma rules to LogRhythm searches☆20Updated 3 years ago
- CrowdStrike's Open Source Policy & Contribution Guide☆39Updated last year
- This repository was created to aid in the deployment/maintenance of the Sysmon service on a large number of computers.☆82Updated last year
- Actionable analytics designed to combat threats based on MITRE's ATT&CK.☆22Updated 5 years ago
- Synthetic Adversarial Log Objects: A Framework for synthentic log generation☆78Updated last year
- PowerSponse is a PowerShell module focused on targeted containment and remediation during incident response.☆38Updated 2 years ago
- ATT&CK Powered Suit is a browser extension that puts the complete MITRE ATT&CK® knowledge base at your fingertips with text search, conte…☆76Updated 3 months ago
- Log Entry to Sigma Rule Converter☆107Updated 2 years ago
- Legal, procedural and policies document templates for operating MISP and information sharing communities☆37Updated 2 years ago
- This code snippet retrieves Azure Sentinel rules that are mapped to MITRE ATT&CK Framework and generates the related MITRE D3FEND defense…☆71Updated 3 years ago
- Useful access control entries (ACE) on system access control list (SACL) of securable objects to find potential adversarial activity☆90Updated 3 years ago
- Collection of resources related to the Center for Threat-Informed Defense☆77Updated 9 months ago
- Cloud Templates and scripts to deploy mordor environments☆129Updated 3 years ago
- The FASTEST way to consume threat intel.☆67Updated last year
- A CALDERA plugin☆74Updated 4 months ago
- Web based S1 query navigator for one-click threat hunting☆18Updated 4 years ago
- OASIS Cyber Threat Intelligence (CTI) TC Open Repository: Convert STIX 1.2 XML to STIX 2.x JSON☆50Updated 10 months ago
- Sigma Detection Rule Repository☆87Updated 4 years ago
- A cross-platform baselining, threat hunting, and attack surface analysis tool for security teams.☆205Updated this week
- SIEGMA - Transform Sigma rules into SIEM consumables☆146Updated last year
- Technical add-on for Splunk related to TheHive/Cortex from TheHive project☆53Updated last month
- Invoke-LiveResponse☆146Updated 3 years ago
- Visual Studio Code extension for MITRE ATT&CK☆53Updated 7 months ago
- Automatic detection engineering technical state compliance☆54Updated 7 months ago
- This repo represents work the Phantom Community collaborates on to build apps and learn.☆12Updated 3 years ago
- Dettectinator - The Python library to your DeTT&CT YAML files.☆108Updated last month