Mapping your datasources and detections to the MITRE ATT&CK Navigator framework.
☆59May 25, 2020Updated 5 years ago
Alternatives and similar repositories for mitre-attack-mapping
Users that are interested in mitre-attack-mapping are comparing it to the libraries listed below
Sorting:
- Detect Tactics, Techniques & Combat Threats☆2,268Jan 21, 2026Updated 2 months ago
- attack2jira automates the process of standing up a Jira environment that can be used to track and measure ATT&CK coverage☆115Mar 26, 2023Updated 2 years ago
- 📱 RUNIC tamper detection demo - designed to serve as a parallel for understanding more complex tamper detection and integrity systems su…☆15Apr 13, 2024Updated last year
- ☆11Jun 12, 2023Updated 2 years ago
- See adversary, do adversary: Simple execution of commands for defensive tuning/research (now with more ELF on the shelf)☆108Feb 12, 2023Updated 3 years ago
- Actionable analytics designed to combat threats☆1,005May 25, 2022Updated 3 years ago
- Re-play Security Events☆1,728Mar 20, 2024Updated 2 years ago
- Microsoft GPO Readiness Lateral Movement Detection Tool☆16Dec 8, 2022Updated 3 years ago
- This content is analysis and research of the data sources currently listed in ATT&CK.☆413Sep 13, 2023Updated 2 years ago
- Threat Report ATT&CK™ Mapping (TRAM) is a tool to aid analyst in mapping finished reports to ATT&CK.☆354Oct 6, 2021Updated 4 years ago
- A Darktrace CLI written in Python☆16Nov 28, 2019Updated 6 years ago
- Browser Shortcuts for Cyber Security Related Online Services☆78Feb 4, 2021Updated 5 years ago
- A MITRE Caldera plugin written in Python 3 used to convert Red Canary Atomic Red Team Tests to MITRE Caldera Stockpile YAML ability files…☆73Oct 14, 2021Updated 4 years ago
- Sample code for 3rd party developers working on Android On Snapdragon☆12Sep 4, 2024Updated last year
- ☆10May 25, 2023Updated 2 years ago
- 🚨ATTENTION🚨 The CVE mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here as…☆240Apr 3, 2024Updated last year
- Security Monitoring Resolution Categories☆138Nov 25, 2021Updated 4 years ago
- Useful Powershell modules.☆11Mar 10, 2017Updated 9 years ago
- 🚨ATTENTION🚨 The NIST 800-53 mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept…☆496Apr 3, 2024Updated last year
- Some resources to facilitate my blog on auditd for security monitoring☆13Mar 23, 2023Updated 2 years ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Apr 18, 2020Updated 5 years ago
- Filters for Shodan Search engine to find vulnerbilities devices connected to internet☆15Feb 3, 2020Updated 6 years ago
- Searches for Insider Threat Hunting☆29May 2, 2019Updated 6 years ago
- Python Script to access ATT&CK content available in STIX via a public TAXII server☆568Dec 19, 2025Updated 3 months ago
- OSSEM Detection Model☆184Oct 11, 2022Updated 3 years ago
- ☆32Aug 16, 2025Updated 7 months ago
- Scripts to automate standing up C2 infra with firewall settings inside of DigitalOcean.☆18Feb 5, 2021Updated 5 years ago
- VulnServer ROP: An Educational Platform for Exploring Buffer Overflow Vulnerabilities and Return-Oriented Programming Techniques☆19Apr 14, 2024Updated last year
- Resources from the Security Presentation☆13Oct 29, 2024Updated last year
- Tools to rapidly deploy a threat hunting capability on Azure Sentinel that leverages Sysmon and MITRE ATT&CK☆1,080Nov 28, 2024Updated last year
- Dettectinator - The Python library to your DeTT&CT YAML files.☆118Jan 22, 2026Updated last month
- A Powershell incident response framework☆1,640Nov 22, 2022Updated 3 years ago
- Converts Sigma detection rules to a Splunk alert configuration.☆115May 18, 2020Updated 5 years ago
- Duo MFA auditing tool to test users' likelihood of approving unexpected push notifications☆13Apr 20, 2018Updated 7 years ago
- A framework for developing alerting and detection strategies for incident response.☆852Sep 8, 2025Updated 6 months ago
- Main Build directory☆179May 1, 2019Updated 6 years ago
- ATT&CK Remote Threat Hunting Incident Response☆206Dec 8, 2024Updated last year
- The repository contains IOCs in CSV format for APT, Cyber Crimes, Malware and Trojan and whatever I found as part of hunting and research☆12Jun 10, 2017Updated 8 years ago
- Python module to interact with the MITRE attack framework via the MITRE API☆89Nov 14, 2017Updated 8 years ago