Mapping your datasources and detections to the MITRE ATT&CK Navigator framework.
☆58May 25, 2020Updated 5 years ago
Alternatives and similar repositories for mitre-attack-mapping
Users that are interested in mitre-attack-mapping are comparing it to the libraries listed below
Sorting:
- Detect Tactics, Techniques & Combat Threats☆2,263Jan 21, 2026Updated last month
- 📱 RUNIC tamper detection demo - designed to serve as a parallel for understanding more complex tamper detection and integrity systems su…☆15Apr 13, 2024Updated last year
- VulnServer ROP: An Educational Platform for Exploring Buffer Overflow Vulnerabilities and Return-Oriented Programming Techniques☆18Apr 14, 2024Updated last year
- A datasource assessment on an event level to show potential coverage or the MITRE ATT&CK framework☆355Nov 3, 2020Updated 5 years ago
- Sample code for 3rd party developers working on Android On Snapdragon☆12Sep 4, 2024Updated last year
- attack2jira automates the process of standing up a Jira environment that can be used to track and measure ATT&CK coverage☆115Mar 26, 2023Updated 2 years ago
- This content is analysis and research of the data sources currently listed in ATT&CK.☆414Sep 13, 2023Updated 2 years ago
- Re-play Security Events☆1,723Mar 20, 2024Updated last year
- Actionable analytics designed to combat threats☆1,006May 25, 2022Updated 3 years ago
- ☆19Sep 3, 2018Updated 7 years ago
- AWS container security survey 2020☆11Dec 2, 2020Updated 5 years ago
- ARC4 (Alleged RC4) cryptography provider class library.☆10Dec 15, 2024Updated last year
- Tools and Scripts used in CRTP☆12Apr 27, 2020Updated 5 years ago
- Monitor and Control how Android Apps access your local storage. A great tool to investigate what files your apps put their eyes on.☆10Feb 5, 2024Updated 2 years ago
- Threat Report ATT&CK™ Mapping (TRAM) is a tool to aid analyst in mapping finished reports to ATT&CK.☆356Oct 6, 2021Updated 4 years ago
- The repository contains IOCs in CSV format for APT, Cyber Crimes, Malware and Trojan and whatever I found as part of hunting and research☆12Jun 10, 2017Updated 8 years ago
- ☆12Mar 22, 2024Updated last year
- Tool Collection for AOSP and AAOS builds☆14Apr 15, 2025Updated 10 months ago
- ☆10Oct 1, 2023Updated 2 years ago
- ☆11Jun 12, 2023Updated 2 years ago
- Admin for☆16Jun 3, 2018Updated 7 years ago
- Useful Powershell modules.☆11Mar 10, 2017Updated 8 years ago
- ☆12Feb 28, 2025Updated last year
- This program generates cyber attack scenarios for use in cyber training exercises, red team planning, blue team planning, automated attac…☆33Apr 15, 2021Updated 4 years ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Apr 18, 2020Updated 5 years ago
- A curated list of awesome C frameworks, libraries, resources and other shiny things. Inspired by all the other awesome-... projects out t…☆10Aug 4, 2024Updated last year
- Generates a change log between different aosp tags. Based on the wonderful work of @alsutton☆12Dec 2, 2025Updated 2 months ago
- Training scenarios for cyber ranges☆15Apr 24, 2020Updated 5 years ago
- A list of Mitre Caldera compatible emulation-plans☆14Feb 1, 2021Updated 5 years ago
- A useful starting point for CFIs, students, and anyone hoping to learn more about aviation.☆15Updated this week
- .NET Project for performing Authenticated Remote Execution☆12Nov 22, 2023Updated 2 years ago
- Browser Shortcuts for Cyber Security Related Online Services☆78Feb 4, 2021Updated 5 years ago
- 🚨ATTENTION🚨 The NIST 800-53 mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept…☆495Apr 3, 2024Updated last year
- Python module to interact with the MITRE attack framework via the MITRE API☆89Nov 14, 2017Updated 8 years ago
- Python Script to access ATT&CK content available in STIX via a public TAXII server☆568Dec 19, 2025Updated 2 months ago
- eLearnSecurity Mobile Application Penetration Tester (eMAPT)☆33Feb 6, 2024Updated 2 years ago
- A tool to modify timestamps in a packet capture to a user selected date☆31Aug 11, 2021Updated 4 years ago
- Creating a vulnerable environment and the PoC☆15Nov 25, 2019Updated 6 years ago
- Python package for Dempster-Shafer related computation☆13Mar 16, 2023Updated 2 years ago