tropChaud / Cyber-Adversary-HeatmapsView external linksLinks
Intelligence around common attacker behaviors (MITRE ATT&CK TTPs), in the form of ATT&CK Navigator "layer" json files.
☆36Aug 12, 2022Updated 3 years ago
Alternatives and similar repositories for Cyber-Adversary-Heatmaps
Users that are interested in Cyber-Adversary-Heatmaps are comparing it to the libraries listed below
Sorting:
- Merge of two major cyber adversary datasets, MITRE ATT&CK and ETDA/ThaiCERT Threat Actor Cards, enabling victim/motivation-adversary-tech…☆54Jul 31, 2022Updated 3 years ago
- Generate portable TTP intelligence from a web-based report☆31Oct 24, 2022Updated 3 years ago
- A threat sighting collects the behavior of a real threats and the observables used during its engagement.☆12Mar 29, 2022Updated 3 years ago
- ☆536Feb 3, 2026Updated last week
- A tool to automate memory dump processing using Volatility, including optional Splunk integration.☆12Jul 29, 2020Updated 5 years ago
- Cyber Threats Detection Rules☆14Sep 16, 2025Updated 5 months ago
- YARA, SIGMA, SNORT Rules based on Malware Analysis☆16Apr 23, 2025Updated 9 months ago
- A Real-time Event Correlation platform☆16Jan 30, 2017Updated 9 years ago
- Firepit - STIX Columnar Storage☆17Jun 5, 2024Updated last year
- The Repository pattern adds a separation layer between the data and domain layers of an application. It also makes the data access parts …☆28Jul 19, 2012Updated 13 years ago
- Summiting the Pyramid is a research project focused on engineering cyber analytics to make adversary evasion more difficult. The research…☆55Updated this week
- Microsoft Sentinel, Defender for Endpoint - KQL Detection Packs☆55Jul 20, 2023Updated 2 years ago
- This repository regroups the Yara Rules for the Unprotect Project☆26Nov 19, 2020Updated 5 years ago
- ☆19Oct 30, 2020Updated 5 years ago
- Graphical map of known Advanced Persistent Threats☆62Jan 31, 2026Updated 2 weeks ago
- Collaborative, web-based case management for incident response☆24Jan 23, 2024Updated 2 years ago
- simple webapp for converting sigma rules into siem queries using the pySigma library☆52Sep 1, 2023Updated 2 years ago
- UI based on react awesome query builder to visualize rule building on rule engine☆29Apr 29, 2022Updated 3 years ago
- TTPMapper is an AI-driven threat intelligence parser that converts unstructured reports whether from web URLs or PDF files into structure…☆49Jun 21, 2025Updated 7 months ago
- CASCADE Server☆274Dec 8, 2022Updated 3 years ago
- Awesome Splunk SPL hunt queries that can be used to detect the latest vulnerability exploitation attempts & subsequent compromise☆68Apr 29, 2024Updated last year
- This repository hosts community contributed Kestrel huntflows (.hf) and huntbooks (.ipynb)☆37Jan 2, 2024Updated 2 years ago
- A work in progress project aimed at conversion of SQL queries to LINQ queries☆35Dec 20, 2018Updated 7 years ago
- ATT&CK Remote Threat Hunting Incident Response☆206Dec 8, 2024Updated last year
- This content is analysis and research of the data sources currently listed in ATT&CK.☆415Sep 13, 2023Updated 2 years ago
- Data from Dark Web Marketplace scraping - Be careful☆43Oct 28, 2024Updated last year
- AIL project training materials☆39Jul 17, 2025Updated 6 months ago
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆42Jan 20, 2026Updated 3 weeks ago
- Cradlepoint ECM Command Line Interface☆11Mar 7, 2023Updated 2 years ago
- CloudPathSniffer is an open-source, easy to use and extensible Cloud Anomaly Detection platform designed to help security teams to find h…☆13Nov 30, 2023Updated 2 years ago
- ☆11Feb 6, 2026Updated last week
- ☆37Dec 17, 2020Updated 5 years ago
- 🚨ATTENTION🚨 The CVE mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here as…☆241Apr 3, 2024Updated last year
- User Feedback Space of #MitreAssistant☆38May 19, 2023Updated 2 years ago
- Mirror of http://hg.code.sf.net/p/roundup/code -- used for CI. Please visit https://issues.roundup-tracker.org to find starter issues o…☆39Feb 9, 2026Updated last week
- GUI Tool to generate threat intelligence information in various formats☆45Jan 18, 2018Updated 8 years ago
- Dashboard Boilerplate from Mapbox Live☆39Dec 28, 2019Updated 6 years ago
- This repository contains Splunk queries to hunt some anomalies☆46Jul 28, 2022Updated 3 years ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆83Apr 27, 2024Updated last year