Intelligence around common attacker behaviors (MITRE ATT&CK TTPs), in the form of ATT&CK Navigator "layer" json files.
☆36Aug 12, 2022Updated 3 years ago
Alternatives and similar repositories for Cyber-Adversary-Heatmaps
Users that are interested in Cyber-Adversary-Heatmaps are comparing it to the libraries listed below
Sorting:
- Merge of two major cyber adversary datasets, MITRE ATT&CK and ETDA/ThaiCERT Threat Actor Cards, enabling victim/motivation-adversary-tech…☆54Jul 31, 2022Updated 3 years ago
- Generate portable TTP intelligence from a web-based report☆31Oct 24, 2022Updated 3 years ago
- A threat sighting collects the behavior of a real threats and the observables used during its engagement.☆12Mar 29, 2022Updated 3 years ago
- WISKESS automates the Windows evidence processing for Incident Response investigations. Rust version.☆16Oct 16, 2025Updated 4 months ago
- A tool to automate memory dump processing using Volatility, including optional Splunk integration.☆12Jul 29, 2020Updated 5 years ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Apr 18, 2020Updated 5 years ago
- Cyber Threats Detection Rules☆14Sep 16, 2025Updated 5 months ago
- Virtual machines that are set up with a variety of known vulnerabilities.☆17Mar 1, 2022Updated 4 years ago
- YARA, SIGMA, SNORT Rules based on Malware Analysis☆16Apr 23, 2025Updated 10 months ago
- The Repository pattern adds a separation layer between the data and domain layers of an application. It also makes the data access parts …☆28Jul 19, 2012Updated 13 years ago
- Firepit - STIX Columnar Storage☆18Jun 5, 2024Updated last year
- Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. The research…☆57Updated this week
- Microsoft Sentinel, Defender for Endpoint - KQL Detection Packs☆55Jul 20, 2023Updated 2 years ago
- Graphical map of known Advanced Persistent Threats☆63Jan 31, 2026Updated last month
- This repository regroups the Yara Rules for the Unprotect Project☆26Nov 19, 2020Updated 5 years ago
- ☆19Oct 30, 2020Updated 5 years ago
- Collaborative, web-based case management for incident response☆24Jan 23, 2024Updated 2 years ago
- Attack Tool Timing and Reporting - Structured Attack Logging Format☆22Nov 4, 2022Updated 3 years ago
- simple webapp for converting sigma rules into siem queries using the pySigma library☆50Sep 1, 2023Updated 2 years ago
- Sharing Threat Hunting runbooks☆25Jul 5, 2019Updated 6 years ago
- OSSEM Detection Model☆183Oct 11, 2022Updated 3 years ago
- CASCADE Server☆274Dec 8, 2022Updated 3 years ago
- Awesome Splunk SPL hunt queries that can be used to detect the latest vulnerability exploitation attempts & subsequent compromise☆68Apr 29, 2024Updated last year
- TTPMapper is an AI-driven threat intelligence parser that converts unstructured reports whether from web URLs or PDF files into structure…☆51Jun 21, 2025Updated 8 months ago
- A Modular MWDB Utility to Collect Fresh Malware Samples☆34May 17, 2021Updated 4 years ago
- This repository hosts community contributed Kestrel huntflows (.hf) and huntbooks (.ipynb)☆37Jan 2, 2024Updated 2 years ago
- A work in progress project aimed at conversion of SQL queries to LINQ queries☆35Dec 20, 2018Updated 7 years ago
- ATT&CK Remote Threat Hunting Incident Response☆206Dec 8, 2024Updated last year
- This content is analysis and research of the data sources currently listed in ATT&CK.☆413Sep 13, 2023Updated 2 years ago
- The official Prelude SIEM GitHub of https://www.prelude-siem.org☆40Jun 12, 2016Updated 9 years ago
- Data from Dark Web Marketplace scraping - Be careful☆43Oct 28, 2024Updated last year
- AIL project training materials☆39Feb 24, 2026Updated last week
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆43Jan 20, 2026Updated last month
- ☆37Dec 17, 2020Updated 5 years ago
- User Feedback Space of #MitreAssistant☆38May 19, 2023Updated 2 years ago
- This repository contains Splunk queries to hunt some anomalies☆46Jul 28, 2022Updated 3 years ago
- Dashboard Boilerplate from Mapbox Live☆39Dec 28, 2019Updated 6 years ago
- Mirror of http://hg.code.sf.net/p/roundup/code -- used for CI. Please visit https://issues.roundup-tracker.org to find starter issues o…☆39Mar 2, 2026Updated last week
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆83Apr 27, 2024Updated last year