Mapping your datasources and detections to the MITRE ATT&CK Navigator framework.
☆61May 25, 2020Updated 5 years ago
Alternatives and similar repositories for mitre-attack-mapping
Users that are interested in mitre-attack-mapping are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Detect Tactics, Techniques & Combat Threats☆2,282Jan 21, 2026Updated 3 months ago
- A datasource assessment on an event level to show potential coverage or the MITRE ATT&CK framework☆357Nov 3, 2020Updated 5 years ago
- attack2jira automates the process of standing up a Jira environment that can be used to track and measure ATT&CK coverage☆115Mar 26, 2023Updated 3 years ago
- 📱 RUNIC tamper detection demo - designed to serve as a parallel for understanding more complex tamper detection and integrity systems su…☆16Apr 13, 2024Updated 2 years ago
- ☆11Jun 12, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- See adversary, do adversary: Simple execution of commands for defensive tuning/research (now with more ELF on the shelf)☆108Feb 12, 2023Updated 3 years ago
- Actionable analytics designed to combat threats☆1,007May 25, 2022Updated 3 years ago
- Re-play Security Events☆1,743Mar 20, 2024Updated 2 years ago
- Microsoft GPO Readiness Lateral Movement Detection Tool☆16Dec 8, 2022Updated 3 years ago
- This content is analysis and research of the data sources currently listed in ATT&CK.☆413Sep 13, 2023Updated 2 years ago
- Threat Report ATT&CK™ Mapping (TRAM) is a tool to aid analyst in mapping finished reports to ATT&CK.☆354Oct 6, 2021Updated 4 years ago
- A Darktrace CLI written in Python☆16Nov 28, 2019Updated 6 years ago
- Browser Shortcuts for Cyber Security Related Online Services☆78Feb 4, 2021Updated 5 years ago
- A MITRE Caldera plugin written in Python 3 used to convert Red Canary Atomic Red Team Tests to MITRE Caldera Stockpile YAML ability files…☆75Oct 14, 2021Updated 4 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Sample code for 3rd party developers working on Android On Snapdragon☆12Sep 4, 2024Updated last year
- ☆10May 25, 2023Updated 2 years ago
- 🚨ATTENTION🚨 The CVE mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here as…☆245Apr 3, 2024Updated 2 years ago
- Security Monitoring Resolution Categories☆138Nov 25, 2021Updated 4 years ago
- Useful Powershell modules.☆11Mar 10, 2017Updated 9 years ago
- 🚨ATTENTION🚨 The NIST 800-53 mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept…☆496Apr 3, 2024Updated 2 years ago
- Some resources to facilitate my blog on auditd for security monitoring☆13Mar 23, 2023Updated 3 years ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆13Apr 18, 2020Updated 6 years ago
- Filters for Shodan Search engine to find vulnerbilities devices connected to internet☆15Feb 3, 2020Updated 6 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Searches for Insider Threat Hunting☆30May 2, 2019Updated 6 years ago
- Python Script to access ATT&CK content available in STIX via a public TAXII server☆569Dec 19, 2025Updated 4 months ago
- OSSEM Detection Model☆184Oct 11, 2022Updated 3 years ago
- ☆33Mar 24, 2026Updated last month
- Scripts to automate standing up C2 infra with firewall settings inside of DigitalOcean.☆18Feb 5, 2021Updated 5 years ago
- Resources from the Security Presentation☆13Oct 29, 2024Updated last year
- VulnServer ROP: An Educational Platform for Exploring Buffer Overflow Vulnerabilities and Return-Oriented Programming Techniques☆19Apr 14, 2024Updated 2 years ago
- Tools to rapidly deploy a threat hunting capability on Azure Sentinel that leverages Sysmon and MITRE ATT&CK☆1,075Nov 28, 2024Updated last year
- Dettectinator - The Python library to your DeTT&CT YAML files.☆117Jan 22, 2026Updated 3 months ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Converts Sigma detection rules to a Splunk alert configuration.☆116May 18, 2020Updated 5 years ago
- Duo MFA auditing tool to test users' likelihood of approving unexpected push notifications☆13Apr 20, 2018Updated 8 years ago
- A Powershell incident response framework☆1,649Nov 22, 2022Updated 3 years ago
- Main Build directory☆179May 1, 2019Updated 6 years ago
- A framework for developing alerting and detection strategies for incident response.☆870Sep 8, 2025Updated 7 months ago
- A list of Mitre Caldera compatible emulation-plans☆14Feb 1, 2021Updated 5 years ago
- ATT&CK Remote Threat Hunting Incident Response☆206Dec 8, 2024Updated last year